Sciweavers

5580 search results - page 957 / 1116
» Randomized priority algorithms
Sort
View
SACRYPT
2007
Springer
126views Cryptology» more  SACRYPT 2007»
14 years 3 months ago
Improved Side-Channel Collision Attacks on AES
Abstract. Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after th...
Andrey Bogdanov
HICSS
2006
IEEE
119views Biometrics» more  HICSS 2006»
14 years 3 months ago
Increasing Relevance of Smoking Cessation Messages in an Online Software Agent Environment
An online software agent that helps smokers quit was designed and tested. We created a library of categorized smoking cessation messages using meta-data corresponding to the Stage...
Todd Shimoda, Linda Stapel
ICPP
2006
IEEE
14 years 3 months ago
Parallel Information Extraction on Shared Memory Multi-processor System
Text Mining is one of the best solutions for today and the future’s information explosion. With the development of modern processor technologies, it will be a mass market deskto...
Jiulong Shan, Yurong Chen, Qian Diao, Yimin Zhang
ISQED
2006
IEEE
78views Hardware» more  ISQED 2006»
14 years 3 months ago
Simultaneous Statistical Delay and Slew Optimization for Interconnect Pipelines
Process variation has become a major concern in the design of many nanometer circuits, including interconnect pipelines. This paper develops closed-form models to predict the dela...
Andrew Havlir, David Z. Pan
MICRO
2006
IEEE
162views Hardware» more  MICRO 2006»
14 years 3 months ago
Adaptive Caches: Effective Shaping of Cache Behavior to Workloads
We present and evaluate the idea of adaptive processor cache management. Specifically, we describe a novel and general scheme by which we can combine any two cache management alg...
Ranjith Subramanian, Yannis Smaragdakis, Gabriel H...