Sciweavers

2272 search results - page 329 / 455
» Validity Invariants and Effects
Sort
View
ASAP
2004
IEEE
141views Hardware» more  ASAP 2004»
15 years 7 months ago
Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite Fields
Binary finite fields GF(2n ) are very commonly used in cryptography, particularly in publickey algorithms such as Elliptic Curve Cryptography (ECC). On word-oriented programmable ...
A. Murat Fiskiran, Ruby B. Lee
BIBE
2004
IEEE
156views Bioinformatics» more  BIBE 2004»
15 years 7 months ago
GeneWebEx: Gene Annotation Web Extraction, Aggregation, and Updating from Web-Based Biomolecular Databanks
Numerous genomic annotations are currently stored in different web-accessible databanks that scientists need to mine with user-defined queries and in a batch mode to orderly integ...
Marco Masseroli, Andrea Stella, Natalia Meani, Myr...
BALT
2006
15 years 7 months ago
A Multiple Correspondence Analysis to Organize Data Cubes
Abstract. On Line Analytical Processing (OLAP) is a technology basically created to provide users with tools in order to explore and navigate into data cubes. Unfortunately, in hug...
Riadh Ben Messaoud, Omar Boussaid, Sabine Loudcher...
CHES
2006
Springer
152views Cryptology» more  CHES 2006»
15 years 7 months ago
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style
In recent years, some countermeasures against Differential Power Analysis (DPA) at the logic level have been proposed. At CHES 2005 conference, Popp and Mangard proposed a new coun...
Daisuke Suzuki, Minoru Saeki
FDL
2004
IEEE
15 years 7 months ago
SystemC and OCAPI-xl Based System-Level Design for Reconfigurable Systems-on-Chip
Reconfigurability is becoming an important part of System-on-Chip (SoC) design to cope with the increasing demands for simultaneous flexibility and computational power. Current ha...
Kari Tiensyrjä, Miroslav Cupák, Kostas...