Sciweavers

12289 search results - page 2158 / 2458
» computing 2006
Sort
View
ETS
2006
IEEE
122views Hardware» more  ETS 2006»
15 years 8 months ago
Fault Identification in Reconfigurable Carry Lookahead Adders Targeting Nanoelectronic Fabrics
Online repair through reconfiguration is a particularly advantageous approach in the nanoelectronic environment since reconfigurability is naturally supported by the devices. Howe...
Wenjing Rao, Alex Orailoglu, Ramesh Karri
EUROCRYPT
2006
Springer
15 years 8 months ago
Hiding Secret Points Amidst Chaff
Motivated by the representation of biometric and multimedia objects, we consider the problem of hiding noisy point-sets using a secure sketch. A point-set X consists of s points fr...
Ee-Chien Chang, Qiming Li
EUROPKI
2006
Springer
15 years 8 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
EUROSYS
2006
ACM
15 years 8 months ago
TCP offload through connection handoff
This paper presents a connection handoff interface between the operating system and the network interface. Using this interface, the operating system can offload a subset of TCP c...
Hyong-youb Kim, Scott Rixner
EVOW
2006
Springer
15 years 8 months ago
On Interactive Evolution Strategies
Abstract. In this paper we discuss Evolution Strategies within the context of interactive optimization. Different modes of interaction will be classified and compared. A focus will...
Ron Breukelaar, Michael Emmerich, Thomas Bäck
« Prev « First page 2158 / 2458 Last » Next »