Sciweavers

1551 search results - page 62 / 311
» How Typical is the
Sort
View
PATMOS
2007
Springer
15 years 10 months ago
Exploiting Input Variations for Energy Reduction
The deep submicron semiconductor technologies will make the worst-case design impossible, since they can not provide design margins that it requires. Research directions should go ...
Toshinori Sato, Yuji Kunitake
PROVSEC
2007
Springer
15 years 10 months ago
On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers
Security of a modern block cipher is commonly measured in terms of its resistance to known attacks. While the provable security approach to block ciphers dates back to the first C...
Ermaliza Razali, Raphael C.-W. Phan, Marc Joye
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
15 years 10 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux
CLUSTER
2006
IEEE
15 years 10 months ago
Improving the Performance of Cluster Applications through I/O Proxy Architecture
Clusters are the most common solutions for high performance computing at the present time. In this kind of systems, an important challenge is the I/O subsystem design. Typically, ...
Luis Miguel Sánchez, Florin Isaila, Alejand...
ICICIC
2006
IEEE
15 years 10 months ago
An Ant Colony Optimization Algorithm for Multiple Travelling Salesman Problem
Multiple travelling salesman problem (MTSP) is a typical computationally complex combinatorial optimization problem,which is an extension of the famous travelling salesman problem...
Pan Junjie, Wang Dingwei