Sciweavers

7978 search results - page 6 / 1596
» Representation before computation
Sort
View
CHES
2004
Springer
187views Cryptology» more  CHES 2004»
14 years 26 days ago
A New Attack with Side Channel Leakage During Exponent Recoding Computations
In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and c...
Yasuyuki Sakai, Kouichi Sakurai
TEI
2009
ACM
103views Hardware» more  TEI 2009»
14 years 2 months ago
A tangible construction kit for exploring graph theory
Graphs are a versatile representation of many systems in computer science, the social sciences, and mathematics, but graph theory is not taught in schools. We present our work on ...
Eric Schweikardt, Nwanua Elumeze, Michael Eisenber...
ISMB
1996
13 years 8 months ago
Improving the Quality of Automatic DNA Sequence Assembly Using Fluorescent Trace-Data Classifications
Virtually all large-scale sequencing projects use automatic sequence-assembly programs to aid in the determination of DNA sequences. The computer-generated assemblies require subs...
Carolyn F. Allex, Schuyler F. Baldwin, Jude W. Sha...
INFOCOM
2010
IEEE
13 years 6 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
COGSCI
2010
125views more  COGSCI 2010»
13 years 7 months ago
A Probabilistic Computational Model of Cross-Situational Word Learning
Words are the essence of communication: they are the building blocks of any language. Learning the meaning of words is thus one of the most important aspects of language acquisiti...
Afsaneh Fazly, Afra Alishahi, Suzanne Stevenson