Sciweavers

12052 search results - page 2114 / 2411
» computer 2010
Sort
View
ATS
2010
IEEE
229views Hardware» more  ATS 2010»
14 years 10 months ago
Variation-Aware Fault Modeling
Abstract--To achieve a high product quality for nano-scale systems both realistic defect mechanisms and process variations must be taken into account. While existing approaches for...
Fabian Hopsch, Bernd Becker, Sybille Hellebrand, I...
187
Voted
BIOCOMP
2010
14 years 10 months ago
A Model Reduction Technique for Stochastic Biochemical Kinetics
Abstract-- Modeling the intermolecular reactions in a single cell is a critical problem in computational biology. Biochemical reaction systems often involve species in both low and...
Silvana Ilie, Ekaterina Kudashkina
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
14 years 10 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel
BIS
2010
197views Business» more  BIS 2010»
14 years 10 months ago
Ubiquitous Microblogging: A Flow-Based Front-End for Information Logistics
The success of information supply strongly depends on successful user adoption. This especially is the case for the integration of non-human information sources deriving from ubiqu...
Martin Böhringer, Martin Gaedke
123
Voted
CANS
2010
Springer
197views Cryptology» more  CANS 2010»
14 years 10 months ago
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
The SHA-3 competition organized by NIST [1] aims to find a new hash standard as a replacement of SHA-2. Till now, 14 submissions have been selected as the second round candidates, ...
Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
« Prev « First page 2114 / 2411 Last » Next »