Sciweavers

1554 search results - page 294 / 311
» An Overview of the Spring System
Sort
View
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
ICCAD
1997
IEEE
76views Hardware» more  ICCAD 1997»
13 years 11 months ago
Simulation methods for RF integrated circuits
Abstract — The principles employed in the development of modern RF simulators are introduced and the various techniques currently in use, or expected to be in use in the next few...
Kenneth S. Kundert
RTAS
1997
IEEE
13 years 11 months ago
Exploiting Redundancy for Timeliness in TCP Boston
While ATM bandwidth-reservation techniques are able to o er the guarantees necessary for the delivery of real-time streams in many applications (e.g. live audio and video), they s...
Azer Bestavros, Gitae Kim
PVM
1997
Springer
13 years 11 months ago
Embedding SCI into PVM
The extremely low latencies and high bandwidth results achievable with the Scalable Coherent Interface SCI at lowest level encourages its integration into existing Message Passin...
Markus Fischer, Jens Simon
ACMACE
2007
ACM
13 years 11 months ago
Pinocchio: conducting a virtual symphony orchestra
We present a system that allows users of any skill to conduct a virtual orchestra. Tempo and volume of the orchestra's performance are influenced with a baton. Pinocchio work...
Bernd Bruegge, Christoph Teschner, Peter Lachenmai...