Sciweavers

1448 search results - page 224 / 290
» Restricted Stack Implementations
Sort
View
CHES
2003
Springer
106views Cryptology» more  CHES 2003»
14 years 27 days ago
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
For most of the time since they were proposed, it was widely believed that hyperelliptic curve cryptosystems (HECC) carry a substantial performance penalty compared to elliptic cur...
Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Ch...
ECSQARU
2003
Springer
14 years 27 days ago
Propositional Fusion Rules
In previous papers, we have presented a logic-based framework for merging structured news reports [14, 16, 15]. Structured news reports are XML documents, where the text entries ar...
Anthony Hunter, Rupert Summerton
ICCBR
2003
Springer
14 years 26 days ago
Evaluation of Case-Based Maintenance Strategies in Software Design
CBR applications running in real domains can easily reach thousands of cases, which are stored in the case library. Retrieval times can increase greatly if the retrieval algorithm ...
Paulo Gomes, Francisco C. Pereira, Paulo Paiva, Nu...
SAC
2010
ACM
14 years 24 days ago
An algorithm to generate the context-sensitive synchronized control flow graph
The verification of industrial systems specified with CSP often implies the analysis of many concurrent and synchronized components. The cost associated to these analyses is usu...
Marisa Llorens, Javier Oliver, Josep Silva, Salvad...
UM
2010
Springer
14 years 22 days ago
PersonisJ: Mobile, Client-Side User Modelling
The increasing trend towards powerful mobile phones opens many possibilities for valuable personalised services to be available on the phone. Client-side personalisation for these ...
Simon Gerber, Michael Fry, Judy Kay, Bob Kummerfel...