Sciweavers

576 search results - page 83 / 116
» Uncertainty in Knowledge Provenance
Sort
View
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
14 years 3 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
IAT
2003
IEEE
14 years 3 months ago
Agent-based decision support for actual-world procurement scenarios
Multi-item, multi-unit negotiations in industrial procurement pose serious challenges to buying agents when trying to determine the best set of providering agents’ offers. Typic...
Juan A. Rodríguez-Aguilar, Andrea Giovannuc...
INFOCOM
2003
IEEE
14 years 3 months ago
The Impact of Correlated Link Weights on QoS Routing
Abstract— Finding a path in a network based on multiple constraints (the MCP problem) is often referred to as QoS routing. QoS routing with constraints on multiple additive metri...
Fernando A. Kuipers, Piet Van Mieghem
DATE
2010
IEEE
134views Hardware» more  DATE 2010»
14 years 3 months ago
Pseudo-CMOS: A novel design style for flexible electronics
Flexible electronics have attracted much attention since they enable promising applications such as lowcost RFID tags and e-paper. Thin-film transistors (TFTs) are considered as ...
Tsung-Ching Huang, Kenjiro Fukuda, Chun-Ming Lo, Y...
SAC
2000
ACM
14 years 2 months ago
The Evolution of the DARWIN System
DARWIN is a web-based system for presenting the results of wind-tunnel testing and computational model analyses to aerospace designers. DARWIN captures the data, maintains the inf...
Joan D. Walton, Robert E. Filman, David J. Korsmey...