Sciweavers

388 search results - page 52 / 78
» Bipartite Modular Multiplication
Sort
View
POPL
2009
ACM
14 years 1 months ago
Speculative N-Way barriers
Speculative execution is an important technique that has historically been used to extract concurrency from sequential programs. While techniques to support speculation work well ...
Lukasz Ziarek, Suresh Jagannathan, Matthew Fluet, ...
ICC
2007
IEEE
190views Communications» more  ICC 2007»
14 years 1 months ago
Minimum Energy Data Gathering in Correlated Sensor Networks with Cooperative Transmission
— We consider combination of Distributed Source Coding (DSC) and cooperative transmission techniques to improve energy efficiency in sensor networks. To start with we formulate ...
Laxminarayana S. Pillutla, Vikram Krishnamurthy
CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
14 years 28 days ago
Predicting Secret Keys Via Branch Prediction
This paper announces a new software side-channel attack — enabled by the branch prediction capability common to all modern highperformance CPUs. The penalty paid (extra clock cyc...
Onur Aciiçmez, Çetin Kaya Koç...
HT
1999
ACM
13 years 11 months ago
Mix'n'match: Exchangeable Modules of Hypermedia Style
Making hypermedia adaptable for multiple forms of presentation involves enabling multiple distinct specifications for how a given collection of hypermedia can have its presentatio...
Lloyd Rutledge, Lynda Hardman, Jacco van Ossenbrug...
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
13 years 10 months ago
Non-linear Residue Codes for Robust Public-Key Arithmetic
We present a scheme for robust multi-precision arithmetic over the positive integers, protected by a novel family of non-linear arithmetic residue codes. These codes have a very hi...
Gunnar Gaubatz, Berk Sunar, Mark G. Karpovsky