Sciweavers

1431 search results - page 118 / 287
» The complexity of random ordered structures
Sort
View
CSMR
2004
IEEE
15 years 6 months ago
Refactoring Web sites to the Controller-Centric Architecture
A Web site is a hyperlinked network environment, which consists of hundreds of inter-connected pages, usually without an engineered architecture. This is often a large, complex We...
Yu Ping, Kostas Kontogiannis
BIOCOMP
2006
15 years 4 months ago
Study on Properties of Protein Folding Conformation Network
- Protein folding conformations take the form of networks, sets of conformations (vertices) joined together in pairs by links or edges. Protein folding conformation network is a co...
Nengchao Wang, Zhongjun Wang
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
15 years 9 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
13 years 10 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
SAC
2008
ACM
15 years 2 months ago
A hybrid software-based self-testing methodology for embedded processor
Software-based self-test (SBST) is emerging as a promising technology for enabling at-speed testing of high-speed embedded processors testing in an SoC system. For SBST, test rout...
Tai-Hua Lu, Chung-Ho Chen, Kuen-Jong Lee