Sciweavers

2913 search results - page 421 / 583
» How Much to Copy
Sort
View
CHES
2000
Springer
114views Cryptology» more  CHES 2000»
14 years 27 days ago
Efficient Generation of Prime Numbers
The generation of prime numbers underlies the use of most public-key schemes, essentially as a major primitive needed for the creation of key pairs or as a computation stage appear...
Marc Joye, Pascal Paillier, Serge Vaudenay
ICSE
2000
IEEE-ACM
14 years 27 days ago
Software reliability and dependability: a roadmap
Software's increasing role creates both requirements for being able to trust it more than before, and for more people to know how much they can trust their software. A sound ...
Bev Littlewood, Lorenzo Strigini
IJCNN
2000
IEEE
14 years 26 days ago
Unsupervised Classification of Complex Clusters in Networks of Spiking Neurons
For unsupervised clustering in a network of spiking neurons we develop a temporal encoding of continuously valued data to obtain arbitrary clustering capacity and precision with a...
Sander M. Bohte, Johannes A. La Poutré, Joo...
QOFIS
2000
Springer
14 years 26 days ago
On the Feasibility of RSVP as General Signalling Interface
Much debate exists whether explicit signalling is eventually required to create a reliable and integrated multi-service Internet. If yes, further disagreement exists, how such sign...
Martin Karsten, Jens Schmitt, Nicole Beriér...
HPCA
1995
IEEE
14 years 26 days ago
Program Balance and Its Impact on High Performance RISC Architectures
Information on the behavior of programs is essential for deciding the number and nature of functional units in high performance architectures. In this paper, we present studies on...
Lizy Kurian John, Vinod Reddy, Paul T. Hulina, Lee...