Sciweavers

257 search results - page 37 / 52
» Breaking Value Symmetry
Sort
View
CORR
2011
Springer
194views Education» more  CORR 2011»
13 years 2 months ago
Polarized Montagovian Semantics for the Lambek-Grishin calculus
Grishin ([10]) proposed enriching the Lambek calculus with multiplicative disjunction (par) and coresiduals. Applications to linguistics were discussed by Moortgat ([15]), who spok...
Arno Bastenhof
SIGMOD
1999
ACM
94views Database» more  SIGMOD 1999»
13 years 12 months ago
Logical Logging to Extend Recovery to New Domains
Recovery can be extended to new domains at reduced logging cost by exploiting "logical" log operations. During recovery, a logical log operation may read data values fro...
David B. Lomet, Mark R. Tuttle
MICRO
1999
IEEE
109views Hardware» more  MICRO 1999»
13 years 12 months ago
Compiler-Directed Dynamic Computation Reuse: Rationale and Initial Results
Recent studies on value locality reveal that many instructions are frequently executed with a small variety of inputs. This paper proposes an approach that integrates architecture...
Daniel A. Connors, Wen-mei W. Hwu
VLSID
2004
IEEE
126views VLSI» more  VLSID 2004»
14 years 8 months ago
Design Considerations for Next Generation Wireless Power-Aware Microsensor Nodes
In order to break the 100 W average power barrier of a wireless microsensor node, aggressive design methodologies need to be developed. Dynamic voltage scaling should be more aggr...
David D. Wentzloff, Benton H. Calhoun, Rex Min, Al...
CHES
2007
Springer
95views Cryptology» more  CHES 2007»
14 years 1 months ago
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Abstract. In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementat...
Jean-Sébastien Coron, Emmanuel Prouff, Matt...