Sciweavers

959 search results - page 38 / 192
» Transfers between Logics and their Applications
Sort
View
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 8 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
WWW
2001
ACM
16 years 2 months ago
XML Key Management Specification (XKMS)
The XML Key Management Specification (XKMS) is described. XKMS is a Web Service that provides an interface between an XML application and a Public Key Infrastructure (PKI). XKMS g...
Phillip M. Hallam-Baker, Warwick Ford
LREC
2008
105views Education» more  LREC 2008»
15 years 3 months ago
Hydra: a Modal Logic Tool for Wordnet Development, Validation and Exploration
This paper presents a multipurpose system for wordnet (WN) development, named Hydra. Hydra is an application for data editing and validation, as well as for data retrieval and syn...
Borislav Rizov
ICCAD
2007
IEEE
151views Hardware» more  ICCAD 2007»
15 years 5 months ago
A design flow dedicated to multi-mode architectures for DSP applications
This paper addresses the design of multi-mode architectures for digital signal processing applications. We present a dedicated design flow and its associated high-level synthesis t...
Cyrille Chavet, Caaliph Andriamisaina, Philippe Co...
WETICE
1999
IEEE
15 years 6 months ago
Active Hypertext for Distributed Web Applications
The prevailing architecture for web-based applications relies on HTML, HTTP and loosely integrated functional elements, propagating a strong distinction between client and server....
Eckhart Köppen, Gustaf Neumann