Sciweavers

194 search results - page 30 / 39
» The Performance Potential of Data Dependence Speculation
Sort
View
SOICT
2010
13 years 3 months ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
VLSID
2002
IEEE
122views VLSI» more  VLSID 2002»
14 years 9 months ago
Evaluating Run-Time Techniques for Leakage Power Reduction
While some leakage power reduction techniques require modification of process technology achieving savings at the fabrication stage, others are based on circuit-level optimization...
David Duarte, Yuh-Fang Tsai, Narayanan Vijaykrishn...
ALT
2006
Springer
14 years 5 months ago
e-Science and the Semantic Web: A Symbiotic Relationship
e-Science is scientific investigation performed through distributed global collaborations between scientists and their resources, and the computing infrastructure that enables this...
Carole A. Goble, Óscar Corcho, Pinar Alper,...
WISTP
2010
Springer
14 years 3 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
C5
2007
IEEE
14 years 3 months ago
Syncing Croquet with the Real World
3D virtual environments like Croquet need to be attractive in order to be visited and used. Their attractiveness depends on the level of vitality that the user is able to experien...
Grit Schuster, Christine Strothotte, Carola Zwick