Sciweavers

438 search results - page 14 / 88
» date 2009
Sort
View
96
Voted
DATE
2009
IEEE
141views Hardware» more  DATE 2009»
15 years 2 months ago
Evaluation on FPGA of triple rail logic robustness against DPA and DEMA
Side channel attacks are known to be efficient techniques to retrieve secret data. In this context, this paper concerns the evaluation of the robustness of triple rail logic agains...
Victor Lomné, Philippe Maurine, Lionel Torr...
CONCUR
2007
Springer
15 years 4 months ago
Solving Games Via Three-Valued Abstraction Refinement
Games via Three-Valued Abstraction Refinement Luca de Alfaro, Pritam Roy PII: S0890-5401(10)00018-0 DOI: 10.1016/j.ic.2009.05.007 Reference: YINCO 3711 To appear in: Information an...
Luca de Alfaro, Pritam Roy
HUC
2009
Springer
15 years 2 months ago
Authenticating ubiquitous services: a study of wireless hotspot access
: © Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate HP Laborator...
Tim Kindberg, Chris Bevan, Eamonn O'Neill, James M...
APPROX
2009
Springer
99views Algorithms» more  APPROX 2009»
15 years 4 months ago
Resource Minimization Job Scheduling
Abstract. Given a set J of jobs, where each job j is associated with release date rj, deadline dj and processing time pj, our goal is to schedule all jobs using the minimum possibl...
Julia Chuzhoy, Paolo Codenotti
SEMWEB
2009
Springer
15 years 4 months ago
Using Hybrid Search and Query for E-discovery Identification
: © Using hybrid search and query for e-discovery identification Dave Grosvenor, Andy Seaborne HP Laboratories HPL-2009-155 SPARQL, e-discovery, identification, hybrid search and ...
Dave Grosvenor, Andy Seaborne