Sciweavers

398 search results - page 18 / 80
» Critical exponents of graphs
Sort
View
AINA
2005
IEEE
14 years 3 months ago
Reducing Security Overhead for Mobile Networks
Security of mobile communications comes with the cost of computational overhead. Reducing the overhead in security computations is critical to ensure the overall performance of a ...
Fangguo Zhang, Yi Mu, Willy Susilo
CHES
2003
Springer
115views Cryptology» more  CHES 2003»
14 years 2 months ago
The Doubling Attack - Why Upwards Is Better than Downwards
The recent developments of side channel attacks have lead implementers to use more and more sophisticated countermeasures in critical operations such as modular exponentiation, or ...
Pierre-Alain Fouque, Frédéric Valett...
ESANN
2006
13 years 11 months ago
Cultures of dissociated neurons display a variety of avalanche behaviours
Avalanche dynamics has been described in organotypic cultures and acute slices from rat cortex. Its distinctive feature is a statistical distribution of avalanche size and duration...
Roberta Alessio, Laura Cozzi, Vittorio Sanguineti
CGF
2010
109views more  CGF 2010»
13 years 4 months ago
Time-Dependent 2-D Vector Field Topology: An Approach Inspired by Lagrangian Coherent Structures
This paper presents an approach to a time-dependent variant of the concept of vector field topology for 2-D vector fields. Vector field topology is defined for steady vector field...
Filip Sadlo, Daniel Weiskopf
ARITH
2011
IEEE
12 years 9 months ago
Fast Ripple-Carry Adders in Standard-Cell CMOS VLSI
— This paper presents a number of new high-radix ripple-carry adder designs based on Ling’s addition technique and a recently-published expansion thereof. The proposed adders a...
Neil Burgess