Sciweavers

2373 search results - page 368 / 475
» Complexities for generalized models of self-assembly
Sort
View
SACRYPT
2007
Springer
126views Cryptology» more  SACRYPT 2007»
15 years 10 months ago
Improved Side-Channel Collision Attacks on AES
Abstract. Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after th...
Andrey Bogdanov
APCCAS
2006
IEEE
233views Hardware» more  APCCAS 2006»
15 years 10 months ago
Jointly Optimized Modulated-Transmitter and Receiver FIR MIMO Filters
— In recent years, several approaches have been proposed aiming the optimal joint design of finite impulse response (FIR) multiple-input multiple-output (MIMO) transmitter and r...
Guilherme Pinto, Paulo S. R. Diniz, Are Hjø...
131
Voted
DOLAP
2006
ACM
15 years 10 months ago
Designing what-if analysis: towards a methodology
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need b...
Matteo Golfarelli, Stefano Rizzi, Andrea Proli
ECLIPSE
2006
ACM
15 years 10 months ago
Guidance through active concerns
Producing usable documentation has always been a tedious task, and even communicating important knowledge about a system among collaborators is difficult. This paper describes an ...
Barthélémy Dagenais, Harold Ossher
SAC
2006
ACM
15 years 10 months ago
Event-driven scheduling for dynamic workload scaling in uniprocessor embedded systems
Many embedded systems are designed to take timely reactions to the occurrences of interested scenarios. Sometimes transient overloads might be experienced due to hardware malfunct...
Li-Pin Chang