Sciweavers

2824 search results - page 463 / 565
» Text Generation from Keywords
Sort
View
ASIACRYPT
2009
Springer
15 years 8 months ago
PSS Is Secure against Random Fault Attacks
A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore’s attack against RS...
Jean-Sébastien Coron, Avradip Mandal
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
15 years 8 months ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiļ...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
UML
2001
Springer
15 years 7 months ago
UML Modelling and Performance Analysis of Mobile Software Architectures
Modern distributed software applications generally operate in complex and heterogeneous computing environments (like the World Wide Web). Different paradigms (client-server, mobili...
Vincenzo Grassi, Raffaela Mirandola
VVS
2000
IEEE
171views Visualization» more  VVS 2000»
15 years 7 months ago
Fast CSG voxelization by frame buffer pixel mapping
This paper describes a fast algorithm for the volume conversion and rendering of CSG models constructed from both geometric and volumetric primitives. Using 3D texture mapping and...
Shiaofen Fang, Duoduo Liao
112
Voted
CHI
2000
ACM
15 years 7 months ago
Power browser: efficient Web browsing for PDAs
We have designed and implemented new Web browsing facilities to support effective navigation on Personal Digital Assistants (PDAs) with limited capabilities: low bandwidth, small ...
Orkut Buyukkokten, Hector Garcia-Molina, Andreas P...