Sciweavers

3318 search results - page 83 / 664
» The Weak Instance Model
Sort
View
ICDCS
2005
IEEE
14 years 1 months ago
Mixed Consistency Model: Meeting Data Sharing Needs of Heterogeneous Users
Heterogeneous users usually have different requirements as far as consistency of shared data is concerned. This paper proposes and investigates a mixed consistency model to meet t...
Zhiyuan Zhan, Mustaque Ahamad, Michel Raynal
CHES
2005
Springer
117views Cryptology» more  CHES 2005»
14 years 1 months ago
DPA Leakage Models for CMOS Logic Circuits
In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate...
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
ESORICS
2011
Springer
12 years 7 months ago
A New RFID Privacy Model
This paper critically examines some recently proposed RFID privacy models. It shows that some models suffer from weaknesses such as insufficient generality and unrealistic assumpt...
Jens Hermans, Andreas Pashalidis, Frederik Vercaut...
DAGSTUHL
2007
13 years 9 months ago
An Information-Theoretic Model of Voting Systems
This paper presents an information-theoretic model of a voting system, consisting of (a) definitions of the desirable qualities of integrity, privacy and verifiability, and (b) ...
Benjamin Hosp, Poorvi L. Vora
JSCIC
2010
61views more  JSCIC 2010»
13 years 2 months ago
Modeling the Early Ionization of Dielectrics by Ultrashort Laser Pulses
In this paper, we present a model for propagation of intense and ultrashort laser pulses ionizing dielectrics. We consider early ionization so that this process is sufficiently we...
Antoine Bourgeade, Candice Mézel, Olivier S...