Sciweavers

7179 search results - page 1221 / 1436
» Design for Product Adaptability
Sort
View
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
15 years 11 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
EDBTW
2010
Springer
15 years 11 months ago
Collaborative data privacy for the web
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use diffe...
Clemens Heidinger, Erik Buchmann, Klemens Böh...
AINA
2009
IEEE
15 years 11 months ago
An Energy Efficient Chain-Based Clustering Routing Protocol for Wireless Sensor Networks
— Wireless sensor network consisting of a large number of sensors is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited po...
Jae Duck Yu, Kyung Tae Kim, Bo Yle Jung, Hee Yong ...
ISPD
2009
ACM
127views Hardware» more  ISPD 2009»
15 years 11 months ago
Synthesizing a representative critical path for post-silicon delay prediction
Several approaches to post-silicon adaptation require feedback from a replica of the nominal critical path, whose variations are intended to reflect those of the entire circuit a...
Qunzeng Liu, Sachin S. Sapatnekar
PAKDD
2009
ACM
116views Data Mining» more  PAKDD 2009»
15 years 11 months ago
Scalable Web Mining with Newistic
Abstract. Newistic is a web mining platform that collects and analyses documents crawled from the Internet. Although it currently processes news articles, it can be easily adapted ...
Ovidiu Dan, Horatiu Mocian
« Prev « First page 1221 / 1436 Last » Next »