Sciweavers

380 search results - page 64 / 76
» The End of Science Revisited
Sort
View
ASIACRYPT
2011
Springer
13 years 9 months ago
Leakage-Resilient Cryptography from the Inner-Product Extractor
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bou...
Stefan Dziembowski, Sebastian Faust
63
Voted
GI
2003
Springer
15 years 2 months ago
Mund-zu-Mund-Propaganda mit Bonussystem in mobilen Ad-Hoc-Netzen
Abstract: Der Erfolg von Funktechnologien wie 802.11b Wireless LAN oder Bluetooth und deren Integration in Handhelds, PDAs etc. erlaubt den Austausch von Wissen durch ad hoc Kommun...
Andreas Heinemann, Tobias Straub
68
Voted
GI
2003
Springer
15 years 2 months ago
When Newspapers Go Electric. Bausteine zu einer Chronologie des Hypes
Abstract: Die letzten zehn Jahre der Entwicklung elektronischer (digitaler) Zeitungsangebote sind geprägt durch den Internet-Boom. Das zentrale Konzept für ein Verständnis diese...
Klemens Polatschek

Publication
194views
16 years 8 months ago
Multimedia Satellite Networks and TCP/IP Traffic Transport
To meet an increasing demand for multimedia services and electronic connectivity across the world, satellite networks will play an indispensable role in the deployment of global ne...
Sastri Kota, Mukul Goyal, Rohit Goyal and Raj Jain
DAC
2004
ACM
15 years 10 months ago
Abstraction of assembler programs for symbolic worst case execution time analysis
ion of Assembler Programs for Symbolic Worst Case Execution Time Analysis Tobias Schuele Tobias.Schuele@informatik.uni-kl.de Klaus Schneider Klaus.Schneider@informatik.uni-kl.de Re...
Klaus Schneider, Tobias Schüle