Sciweavers

222 search results - page 34 / 45
» Performance Impact of Addressing Modes on Encryption Algorit...
Sort
View
INFOCOM
2006
IEEE
14 years 1 months ago
Evaluating Mobility Pattern Space Routing for DTNs
— Because a delay tolerant network (DTN) can often be partitioned, routing is a challenge. However, routing benefits considerably if one can take advantage of knowledge concerni...
Jeremie Leguay, Timur Friedman, Vania Conan
ACG
2006
Springer
14 years 1 months ago
Automatic Generation of Search Engines
A plethora of enhancements are available to be used together with the αβ search algorithm. There are so many, that their selection and implementation is a non-trivial task, even ...
Markian Hlynka, Jonathan Schaeffer
ICDCS
2010
IEEE
13 years 11 months ago
CONTRACT: Incorporating Coordination into the IP Network Control Plane
—This paper presents the CONTRACT framework to address a fundamental deficiency of the IP network control plane, namely the lack of coordination between an IGP and other control...
Zheng Cai, Florin Dinu, Jie Zheng, Alan L. Cox, T....
JMLR
2006
80views more  JMLR 2006»
13 years 7 months ago
Using Machine Learning to Guide Architecture Simulation
An essential step in designing a new computer architecture is the careful examination of different design options. It is critical that computer architects have efficient means by ...
Greg Hamerly, Erez Perelman, Jeremy Lau, Brad Cald...
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
13 years 11 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...