Sciweavers

2561 search results - page 493 / 513
» Enhanced Quicksort Algorithm
Sort
View
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
14 years 20 days ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
ITCC
2003
IEEE
14 years 20 days ago
A Method for Calculating Term Similarity on Large Document Collections
We present an efficient algorithm called the Quadtree Heuristic for identifying a list of similar terms for each unique term in a large document collection. Term similarity is de...
Wolfgang W. Bein, Jeffrey S. Coombs, Kazem Taghva
CASES
2003
ACM
14 years 19 days ago
Exploiting bank locality in multi-bank memories
Bank locality can be defined as localizing the number of load/store accesses to a small set of memory banks at a given time. An optimizing compiler can modify a given input code t...
Guilin Chen, Mahmut T. Kandemir, Hendra Saputra, M...
DOCENG
2003
ACM
14 years 19 days ago
Creating reusable well-structured PDF as a sequence of component object graphic (COG) elements
Portable Document Format (PDF) is a page-oriented, graphically rich format based on PostScript semantics and it is also the format interpreted by the Adobe Acrobat viewers. Althou...
Steven R. Bagley, David F. Brailsford, Matthew R. ...
MSWIM
2003
ACM
14 years 19 days ago
On the application of traffic engineering over bluetooth ad hoc networks
The seamless communication of data and voice over short-range, point-to-multipoint wireless links between mobile and/or stationary devices is becoming a reality by newly introduce...
Sachin Abhyankar, Rishi Toshniwal, Carlos de M. Co...