Sciweavers

438 search results - page 65 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
EUC
2005
Springer
14 years 1 months ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...
DAC
2002
ACM
14 years 8 months ago
A physical model for the transient response of capacitively loaded distributed rlc interconnects
Rapid approximation of the transient response of high-speed global interconnects is needed to estimate the time delay, crosstalk, and overshoot in a GSI multilevel wiring network....
Raguraman Venkatesan, Jeffrey A. Davis, James D. M...
IOLTS
2009
IEEE
174views Hardware» more  IOLTS 2009»
14 years 2 months ago
ATPG-based grading of strong fault-secureness
—Robust circuit design has become a major concern for nanoscale technologies. As a consequence, for design validation, not only the functionality of a circuit has to be considere...
Marc Hunger, Sybille Hellebrand, Alejandro Czutro,...
ICDIM
2006
IEEE
14 years 1 months ago
Model-Driven Development of Content-Based Image Retrieval Systems
: Generic systems for content-based image retrieval (CBIR), such as QBIC [7] cannot be used to solve domain-specific image retrieval problems, as for example, the identification of...
Temenushka Ignatova
SIGMOD
1997
ACM
100views Database» more  SIGMOD 1997»
13 years 11 months ago
MDM: a Multiple-Data-Model Tool for the Management of Heterogeneous Database Schemes
MDM is a tool that enables the users to de ne schemes of di erent data models and to perform translations of schemes from one model to another. These functionalities can be at the...
Paolo Atzeni, Riccardo Torlone