Sciweavers

1429 search results - page 269 / 286
» An Overview of the Annex System
Sort
View
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
14 years 2 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
ICCAD
1997
IEEE
76views Hardware» more  ICCAD 1997»
14 years 2 months ago
Simulation methods for RF integrated circuits
Abstract — The principles employed in the development of modern RF simulators are introduced and the various techniques currently in use, or expected to be in use in the next few...
Kenneth S. Kundert
RTAS
1997
IEEE
14 years 2 months ago
Exploiting Redundancy for Timeliness in TCP Boston
While ATM bandwidth-reservation techniques are able to o er the guarantees necessary for the delivery of real-time streams in many applications (e.g. live audio and video), they s...
Azer Bestavros, Gitae Kim
PVM
1997
Springer
14 years 2 months ago
Embedding SCI into PVM
The extremely low latencies and high bandwidth results achievable with the Scalable Coherent Interface SCI at lowest level encourages its integration into existing Message Passin...
Markus Fischer, Jens Simon
ACMACE
2007
ACM
14 years 1 months ago
Pinocchio: conducting a virtual symphony orchestra
We present a system that allows users of any skill to conduct a virtual orchestra. Tempo and volume of the orchestra's performance are influenced with a baton. Pinocchio work...
Bernd Bruegge, Christoph Teschner, Peter Lachenmai...