Sciweavers

493 search results - page 38 / 99
» The oracle penalty method
Sort
View
FDTC
2007
Springer
124views Cryptology» more  FDTC 2007»
14 years 3 months ago
Countermeasures against Branch Target Buffer Attacks
Branch Prediction Analysis has been recently proposed as an attack method to extract the key from software implementations of the RSA public key cryptographic algorithm. In this p...
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi,...
HAPTICS
2005
IEEE
14 years 2 months ago
Dynamic Primitive Caching for Haptic Rendering of Large-Scale Models
In this paper we present a software approach to managing complexity for haptic rendering of large-scale geometric models, consisting of tens to hundreds of thousands of distinct g...
Mashhuda Glencross, Roger J. Hubbold, Ben Lyons
CP
2005
Springer
14 years 2 months ago
Incremental Algorithms for Local Search from Existential Second-Order Logic
Local search is a powerful and well-established method for solving hard combinatorial problems. Yet, until recently, it has provided very little user support, leading to time-consu...
Magnus Ågren, Pierre Flener, Justin Pearson
ICCAD
1997
IEEE
133views Hardware» more  ICCAD 1997»
14 years 1 months ago
Functional simulation using binary decision diagrams
In many veri cation techniques fast functional evaluation of a Boolean network is needed. We investigate the idea of using Binary Decision Diagrams BDDs for functional simulatio...
Christoph Scholl, Rolf Drechsler, Bernd Becker
TREC
1994
13 years 10 months ago
Searching For Meaning With The Help Of A PADRE
Full-text scanning oers signi cant advantages over other methods of document retrieval but is normally too slow for use on large collections. The Fujitsu AP1000 parallel distribut...
David Hawking, Paul B. Thistlewaite