Sciweavers

2008 search results - page 316 / 402
» MUC-4 evaluation metrics
Sort
View
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
14 years 2 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
EXPCS
2007
14 years 1 months ago
An analysis of XML compression efficiency
XML simplifies data exchange among heterogeneous computers, but it is notoriously verbose and has spawned the development of many XML-specific compressors and binary formats. We p...
Christopher J. Augeri, Dursun A. Bulutoglu, Barry ...
ICAIL
2007
ACM
14 years 1 months ago
Mapping regulations to industry-specific taxonomies
For each industry, there exist many taxonomies that are intended for various applications. There are also multiple sources of regulations from different government agencies. Indus...
Chin Pang Cheng, Gloria T. Lau, Kincho H. Law
DATE
2004
IEEE
105views Hardware» more  DATE 2004»
14 years 1 months ago
Time-Energy Design Space Exploration for Multi-Layer Memory Architectures
This paper presents an exploration algorithm which examines execution time and energy consumption of a given application, while considering a parameterized memory architecture. Th...
Radoslaw Szymanek, Francky Catthoor, Krzysztof Kuc...
ANTSW
2008
Springer
14 years 2 days ago
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol
Design and development of routing protocols for Mobile Ad Hoc Networks (MANETs) is an active area of research. The standard practice among researchers working in this emerging doma...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq