Sciweavers

18306 search results - page 3614 / 3662
» Algorithmics in Exponential Time
Sort
View
CEE
2007
110views more  CEE 2007»
13 years 7 months ago
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This paper presents a HW/SW c...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...
INTERNET
2008
134views more  INTERNET 2008»
13 years 7 months ago
Multilanguage Programming
more abstractly to the tools, tactics, and techniques pertinent to each profession. Top basketball players know multiple ways to help their teams with scoring, passing, and defense...
Steve Vinoski
IJDSN
2006
114views more  IJDSN 2006»
13 years 7 months ago
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense
The ability of sensor nodes to enter a low power sleep mode is very useful for extending network longevity. We show how adversary nodes can exploit clustering algorithms to ensure ...
Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrish...
IVC
2008
101views more  IVC 2008»
13 years 7 months ago
A system for processing handwritten bank checks automatically
In the US and many other countries, bank checks are preprinted with the account number and the check number in MICR ink and format; as such, these two numeric fields can be easily...
Rafael Palacios, Amar Gupta
IVS
2008
121views more  IVS 2008»
13 years 7 months ago
Using treemaps for variable selection in spatio-temporal visualisation
We demonstrate and reflect upon the use of enhanced treemaps that incorporate spatial and temporal ordering for exploring a large multivariate spatio-temporal data set. The result...
Aidan Slingsby, Jason Dykes, Jo Wood
« Prev « First page 3614 / 3662 Last » Next »