Sciweavers

1722 search results - page 27 / 345
» Dedication
Sort
View
FSE
2005
Springer
118views Cryptology» more  FSE 2005»
14 years 3 months ago
A Side-Channel Analysis Resistant Description of the AES S-Box
So far, efficient algorithmic countermeasures to secure the AES algorithm against (first-order) differential side-channel attacks have been very expensive to implement. In this a...
Elisabeth Oswald, Stefan Mangard, Norbert Pramstal...
TIDSE
2004
Springer
14 years 3 months ago
Writing Interactive Fiction Scenarii with DraMachina
Abstract. This paper presents DraMachina, an authoring tool dedicated to authors of interactive fictions. An interactive fiction is an extension of classical narrative media as i...
Stéphane Donikian, Jean-Noël Portugal
ICTAI
2003
IEEE
14 years 3 months ago
A Cognitive Vision Platform for Automatic Recognition of Natural Complex Objects
This paper presents a generic cognitive vision platform for the automatic recognition of natural complex objects. The recognition consists of three steps : image processing for nu...
Céline Hudelot, Monique Thonnat
APLAS
2003
ACM
14 years 3 months ago
Controlling and Optimizing the Usage of One Resource
This paper studies the problem of resource availability in the context of mobile code for embedded systems such as smart cards. It presents an architecture dedicated to controlling...
Antoine Galland, Mathieu Baudet
CLUSTER
2002
IEEE
14 years 2 months ago
Reliable Blast UDP: Predictable High Performance Bulk Data Transfer
High speed bulk data transfer is an important part of many data-intensive scientific applications. This paper describes an aggressive bulk data transfer scheme, called Reliable Bl...
Eric He, Jason Leigh, Oliver T. Yu, Thomas A. DeFa...