Sciweavers

2767 search results - page 361 / 554
» Universal Exponentiation Algorithm
Sort
View
ACSAC
2005
IEEE
14 years 4 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
ARITH
2005
IEEE
14 years 4 months ago
Table Lookup Structures for Multiplicative Inverses Modulo 2k
We introduce an inheritance property and related table lookup structures applicable to simplified evaluation of the modular operations “multiplicative inverse”, “discrete l...
David W. Matula, Alex Fit-Florea, Mitchell Aaron T...
ICCAD
2005
IEEE
134views Hardware» more  ICCAD 2005»
14 years 4 months ago
Fast thermal simulation for architecture level dynamic thermal management
As power density increases exponentially, runtime regulation of operating temperature by dynamic thermal managements becomes necessary. This paper proposes a novel approach to the...
Pu Liu, Zhenyu Qi, Hang Li, Lingling Jin, Wei Wu, ...
ICCD
2005
IEEE
131views Hardware» more  ICCD 2005»
14 years 4 months ago
Efficient Thermal Simulation for Run-Time Temperature Tracking and Management
As power density increases exponentially, run-time regulation of operating temperature by dynamic thermal management becomes imperative. This paper proposes a novel approach to re...
Hang Li, Pu Liu, Zhenyu Qi, Lingling Jin, Wei Wu, ...
IDEAS
2005
IEEE
113views Database» more  IDEAS 2005»
14 years 4 months ago
On the Intersection of XPath Expressions
— XPath is a common language for selecting nodes in an XML document. XPath uses so called path expressions which describe a navigation path through semistructured data. In the la...
Beda Christoph Hammerschmidt, Martin Kempa, Volker...