Sciweavers

241 search results - page 35 / 49
» Four Paths to AI
Sort
View
ISCA
2008
IEEE
150views Hardware» more  ISCA 2008»
14 years 2 months ago
Fetch-Criticality Reduction through Control Independence
Architectures that exploit control independence (CI) promise to remove in-order fetch bottlenecks, like branch mispredicts, instruction-cache misses and fetch unit stalls, from th...
Mayank Agarwal, Nitin Navale, Kshitiz Malik, Matth...
CHES
2007
Springer
154views Cryptology» more  CHES 2007»
14 years 1 months ago
Multi-gigabit GCM-AES Architecture Optimized for FPGAs
Abstract. This paper presents a design-space exploration of the Galois/Counter Mode (GCM) algorithm with Advanced Encryption Standard (AES) as underlying block cipher for high thro...
Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert ...
UIC
2007
Springer
14 years 1 months ago
Ontology-Based Semantic Recommendation for Context-Aware E-Learning
Nowadays, e-learning systems are widely used for education and training in universities and companies because of their electronic course content access and virtual classroom partic...
Zhiwen Yu, Yuichi Nakamura, Seiie Jang, Shoji Kaji...
WG
2007
Springer
14 years 1 months ago
Characterisations and Linear-Time Recognition of Probe Cographs
Cographs are those graphs without induced path on four vertices. A graph G is a probe cograph if its vertex set can be partitioned into two sets, N (non-probes) and P (probes) wher...
Van Bang Le, H. N. de Ridder
ACSAC
2006
IEEE
14 years 1 months ago
Practical Attack Graph Generation for Network Defense
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
Kyle Ingols, Richard Lippmann, Keith Piwowarski