Sciweavers

4155 search results - page 718 / 831
» External Memory Algorithms
Sort
View
PERVASIVE
2007
Springer
14 years 4 months ago
Movement-Based Group Awareness with Wireless Sensor Networks
We propose a method through which dynamic sensor nodes determine that they move together, by communicating and correlating their movement information. We describe two possible solu...
Raluca Marin-Perianu, Mihai Marin-Perianu, Paul J....
SACRYPT
2007
Springer
126views Cryptology» more  SACRYPT 2007»
14 years 4 months ago
Improved Side-Channel Collision Attacks on AES
Abstract. Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after th...
Andrey Bogdanov
SAS
2007
Springer
124views Formal Methods» more  SAS 2007»
14 years 4 months ago
Arithmetic Strengthening for Shape Analysis
Abstract. Shape analyses are often imprecise in their numerical reasoning, whereas numerical static analyses are often largely unaware of the shape of a program’s heap. In this p...
Stephen Magill, Josh Berdine, Edmund M. Clarke, By...
TAMC
2007
Springer
14 years 4 months ago
Finding a Duplicate and a Missing Item in a Stream
We consider the following problem in a stream model: Given a sequence a = a1, a2, . . . , am wich each ai ∈ [n] = {1, . . . , n} and m > n, find a duplicate in the sequence, ...
Jun Tarui
CODES
2006
IEEE
14 years 4 months ago
Streamroller: : automatic synthesis of prescribed throughput accelerator pipelines
In this paper, we present a methodology for designing a pipeline of accelerators for an application. The application is modeled using sequential C language with simple stylization...
Manjunath Kudlur, Kevin Fan, Scott A. Mahlke