Sciweavers

3571 search results - page 657 / 715
» On the Power of Imperfect Information
Sort
View
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
14 years 2 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
SAS
2007
Springer
108views Formal Methods» more  SAS 2007»
14 years 2 months ago
Programming Language Design and Analysis Motivated by Hardware Evolution
Abstract. Silicon chip design has passed a threshold whereby exponentially increasing transistor density (Moore’s Law) no longer translates into increased processing power for si...
Alan Mycroft
SCHULE
2007
Springer
14 years 2 months ago
Exploratory Learning
: In our department we have a long history of developing interfaces for learning, which are framed by constructivist and constructionist theories of learning. Thus we try to create...
Ivan Kalas, D. Lehotska
AUIC
2006
IEEE
14 years 2 months ago
Patternprogrammer: yet another rule-based programming environment for children
Graphical rewrite rules are often used in programming environments for children. These rules consist of two parts: a left-hand side, which is visually matched in the environment, ...
Tim Wright
CCECE
2006
IEEE
14 years 2 months ago
Survey of Biological High Performance Computing: Algorithms, Implementations and Outlook Research
During recent years there has been an explosive growth of biological data coming from genome projects, proteomics, protein structure determination, and the rapid expansion in digi...
Nasreddine Hireche, J. M. Pierre Langlois, Gabriel...