Sciweavers

23 search results - page 3 / 5
» The Seventies
Sort
View
CHES
2001
Springer
193views Cryptology» more  CHES 2001»
15 years 2 months ago
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
Abstract. In this paper we show how using a representation of an elliptic curve as the intersection of two quadrics in P3 can provide a defence against Simple and Differental Powe...
Pierre-Yvan Liardet, Nigel P. Smart
APSEC
2004
IEEE
15 years 1 months ago
MUDABlue: An Automatic Categorization System for Open Source Repositories
Open Source communities typically use a software repository to archive various software projects with their source code, mailing list discussions, documentation, bug reports, and ...
Shinji Kawaguchi, Pankaj K. Garg, Makoto Matsushit...
ACL
1998
14 years 11 months ago
A Descriptive Characterization of Tree-Adjoining Languages (Project Note)
Since the early Sixties and Seventies it has been known that the regular and context-free languages arc characterized by definability in the monadic second-order theory of certain...
James Rogers
NIPS
1994
14 years 11 months ago
A Connectionist Technique for Accelerated Textual Input: Letting a Network Do the Typing
Each yearpeoplespendahugeamountoftimetyping. Thetextpeopletype typically contains a tremendousamount of redundancy due to predictable word usage patterns and the text's struc...
Dean Pomerleau
ISF
2002
107views more  ISF 2002»
14 years 9 months ago
A Negotiation Enabling Agent Based Infrastructure: Composition and Behavior
Software agent-based negotiation is a major method to automate the interactions in electronic marketplaces and Internet enabled communities. The traditional approach is to let the...
Nicolae B. Szirbik