Sciweavers

17409 search results - page 3272 / 3482
» The Design and Performance of MedJava
Sort
View
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 5 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 5 months ago
Support vector machine classifiers for sequential decision problems
Classification problems in critical applications such as health care or security often require very high reliability because of the high costs of errors. In order to achieve this r...
Eladio Rodriguez Diaz, David A. Castaon
CONCUR
2010
Springer
15 years 5 months ago
Reasoning about Optimistic Concurrency Using a Program Logic for History
Optimistic concurrency algorithms provide good performance for parallel programs but they are extremely hard to reason about. Program logics such as concurrent separation logic and...
Ming Fu, Yong Li, Xinyu Feng, Zhong Shao, Yu Zhang
CIDR
2009
98views Algorithms» more  CIDR 2009»
15 years 5 months ago
From Declarative Languages to Declarative Processing in Computer Games
Recent work has shown that we can dramatically improve the performance of computer games and simulations through declarative processing: Character AI can be written in an imperati...
Ben Sowell, Alan J. Demers, Johannes Gehrke, Nitin...
DMSN
2010
ACM
15 years 5 months ago
Query-driven data collection and data forwarding in intermittently connected mobile sensor networks
In sparse and intermittently connected Mobile Sensor Networks (MSNs), the base station cannot easily get the data objects acquired by the mobile sensors in the field. When users q...
Wei Wu, Hock-Beng Lim, Kian-Lee Tan
« Prev « First page 3272 / 3482 Last » Next »