Sciweavers

2433 search results - page 40 / 487
» Power laws in software
Sort
View
153
Voted
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
15 years 2 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
141
Voted
ICPADS
2010
IEEE
15 years 2 months ago
Fault Tolerant Network Routing through Software Overlays for Intelligent Power Grids
Control decisions of intelligent devices in critical infrastructure can have a significant impact on human life and the environment. Insuring that the appropriate data is availabl...
Christopher Zimmer, Frank Mueller
ADAEUROPE
2007
Springer
15 years 10 months ago
Towards the Testing of Power-Aware Software Applications for Wireless Sensor Networks
The testing of programs in wireless sensor networks (WSN) is an important means to assure quality but is a challenging process. As pervasive computing has been identified as a not...
W. K. Chan, Tsong Yueh Chen, S. C. Cheung, T. H. T...
ESTIMEDIA
2005
Springer
15 years 9 months ago
A Perception-Aware Low-Power Software Audio Decoder for Portable Devices
We propose a new software audio decoder for processors supporting multiple discrete voltage-frequency operating points. The proposed decoding scheme allows the user to switch betw...
Samarjit Chakraborty, Ye Wang, Wendong Huang
127
Voted
AMAST
2010
Springer
14 years 11 months ago
Coalgebraic Semantics for Parallel Derivation Strategies in Logic Programming
Ekaterina Komendantskaya, Guy McCusker, John Power