Sciweavers

620 search results - page 90 / 124
» Likelihood Computations Using Value Abstraction
Sort
View
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 3 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
WCRE
2002
IEEE
14 years 2 months ago
Analysis of Virtual Method Invocation for Binary Translation
The University of Queensland Binary Translator (UQBT ) is a static binary translation framework that allows for the translation of binary, executable programs, from one architectu...
Jens Tröger, Cristina Cifuentes
ECOOP
1999
Springer
14 years 2 months ago
Wide Classes
Abstract. This paper introduces the concepts of wide classes and widening as extensions to the object model of class-based languages such as Java and Smalltalk. Widening allows an ...
Manuel Serrano
ACIVS
2005
Springer
14 years 3 months ago
Reduced-Bit, Full Search Block-Matching Algorithms and Their Hardware Realizations
Abstract. The Full Search Block-Matching Motion Estimation (FSBME) algorithm is often employed in video coding for its regular dataflow and straightforward architectures. By iterat...
Vincent M. Dwyer, Shahrukh Agha, Vassilios A. Chou...
CEC
2008
IEEE
13 years 12 months ago
Efficient evolution of ART neural networks
Abstract-- Genetic algorithms have been used to evolve several neural network architectures. In a previous effort, we introduced the evolution of three well known ART architects; F...
Assem Kaylani, Michael Georgiopoulos, Mansooreh Mo...