Sciweavers

1549 search results - page 282 / 310
» On the rules of intermediate logics
Sort
View
CHES
2005
Springer
96views Cryptology» more  CHES 2005»
14 years 1 months ago
The "Backend Duplication" Method
Abstract. Several types of logic gates suitable for leakage-proof computations have been put forward [1,2,3,4]. This paper describes a method, called “backend duplication” to a...
Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu,...
FPL
2005
Springer
137views Hardware» more  FPL 2005»
14 years 1 months ago
Bitwise Optimised CAM for Network Intrusion Detection Systems
String pattern matching is a computationally expensive task, and when implemented in hardware, it can consume a large amount of resources for processing and storage. This paper pr...
Sherif Yusuf, Wayne Luk
FSKD
2005
Springer
90views Fuzzy Logic» more  FSKD 2005»
14 years 1 months ago
Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets
The value of the itemset share is one way of evaluating the magnitude of an itemset. From business perspective, itemset share values reflect more the significance of itemsets for m...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
ADC
2004
Springer
109views Database» more  ADC 2004»
14 years 1 months ago
Data Flow and Validation in Workflow Modelling
A complete workflow specification requires careful integration of many different process characteristics. Decisions must be made as to the definitions of individual activities, th...
Shazia W. Sadiq, Maria E. Orlowska, Wasim Sadiq, C...
CAISE
2004
Springer
14 years 1 months ago
Object-Process Methodology (OPM) vs. UML - a Code Generation Perspective
Modeling languages have been evolving at a high pace, encouraging the use of automatic code generators for transforming models to programs. Automatic code generators should enable ...
Iris Reinhartz-Berger, Dov Dori