Sciweavers

2125 search results - page 113 / 425
» Points with Type-2 Operations
Sort
View
135
Voted
JCP
2007
127views more  JCP 2007»
15 years 3 months ago
Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem
Abstract— Side channel attacks such as Simple Power Analysis(SPA) attacks provide a new challenge for securing algorithms from an attacker. Algorithms for elliptic curve point sc...
Andrew Byrne, Nicolas Meloni, Arnaud Tisserand, Em...
119
Voted
VC
2008
95views more  VC 2008»
15 years 3 months ago
High frequency geometric detail manipulation and editing for point-sampled surfaces
In this paper, based on the new definition of high frequency geometric detail for point-sampled surfaces, a new approach for detail manipulation and a detail-preserving editing fra...
Yongwei Miao, Jieqing Feng, Chunxia Xiao, Qunsheng...
110
Voted
CISIS
2009
IEEE
15 years 1 months ago
Lifetime in Wireless Sensor Networks
The following paper deals with criterion used to measure communication protocol efficiency in Wireless Sensor Networks. As energy is a crucial characteristic of those networks, it...
Julien Champ, Clément Saad, Anne-Elisabeth ...
138
Voted
B
2007
Springer
15 years 9 months ago
Augmenting B with Control Annotations
Abstract. CSP B is an integration of the process algebra Communicating Sequential Processes (CSP), and the B-Method, which enables consistent controllers to be written for B machin...
Wilson Ifill, Steve A. Schneider, Helen Treharne
110
Voted
CONCUR
2008
Springer
15 years 5 months ago
A Scalable and Oblivious Atomicity Assertion
Abstract. This paper presents SOAR: the first oblivious atomicity assertion with polynomial complexity. SOAR enables to check atomicity of a single-writer multi-reader register imp...
Rachid Guerraoui, Marko Vukolic