Sciweavers

23 search results - page 3 / 5
» The Seventies
Sort
View
CHES
2001
Springer
193views Cryptology» more  CHES 2001»
15 years 4 months ago
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
Abstract. In this paper we show how using a representation of an elliptic curve as the intersection of two quadrics in P3 can provide a defence against Simple and Differental Powe...
Pierre-Yvan Liardet, Nigel P. Smart
APSEC
2004
IEEE
15 years 3 months ago
MUDABlue: An Automatic Categorization System for Open Source Repositories
Open Source communities typically use a software repository to archive various software projects with their source code, mailing list discussions, documentation, bug reports, and ...
Shinji Kawaguchi, Pankaj K. Garg, Makoto Matsushit...
ACL
1998
15 years 1 months ago
A Descriptive Characterization of Tree-Adjoining Languages (Project Note)
Since the early Sixties and Seventies it has been known that the regular and context-free languages arc characterized by definability in the monadic second-order theory of certain...
James Rogers
NIPS
1994
15 years 1 months ago
A Connectionist Technique for Accelerated Textual Input: Letting a Network Do the Typing
Each yearpeoplespendahugeamountoftimetyping. Thetextpeopletype typically contains a tremendousamount of redundancy due to predictable word usage patterns and the text's struc...
Dean Pomerleau
ISF
2002
107views more  ISF 2002»
14 years 11 months ago
A Negotiation Enabling Agent Based Infrastructure: Composition and Behavior
Software agent-based negotiation is a major method to automate the interactions in electronic marketplaces and Internet enabled communities. The traditional approach is to let the...
Nicolae B. Szirbik