Sciweavers

563 search results - page 76 / 113
» Verifiable Signature Sharing
Sort
View
154
Voted
EELC
2006
121views Languages» more  EELC 2006»
15 years 7 months ago
Simulating Meaning Negotiation Using Observational Language Games
In this article, we study the emergence of associations between words and concepts using the self-organizing map. In particular, we explore the meaning negotiations among communica...
Tiina Lindh-Knuutila, Timo Honkela, Krista Lagus
141
Voted
ICISC
2008
113views Cryptology» more  ICISC 2008»
15 years 5 months ago
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operatio...
Svetla Nikova, Vincent Rijmen, Martin Schläff...
135
Voted
SOSP
1997
ACM
15 years 4 months ago
Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs
Multi-threaded programming is difficult and error prone. It is easy to make a mistake in synchronization that produces a data race, yet it can be extremely hard to locate this mi...
Stefan Savage, Michael Burrows, Greg Nelson, Patri...
151
Voted
JCP
2008
171views more  JCP 2008»
15 years 3 months ago
Mining Frequent Subgraph by Incidence Matrix Normalization
Existing frequent subgraph mining algorithms can operate efficiently on graphs that are sparse, have vertices with low and bounded degrees, and contain welllabeled vertices and edg...
Jia Wu, Ling Chen
112
Voted
JNW
2006
63views more  JNW 2006»
15 years 3 months ago
MAC Contention in a Wireless LAN with Noncooperative Anonymous Stations
In ad hoc wireless LANs populated by mutually impenetrable groups of anonymous stations, honest stations are prone to "bandwidth stealing" by selfish stations. The proble...
Jerzy Konorski