Sciweavers

563 search results - page 76 / 113
» Verifiable Signature Sharing
Sort
View
EELC
2006
121views Languages» more  EELC 2006»
14 years 16 days ago
Simulating Meaning Negotiation Using Observational Language Games
In this article, we study the emergence of associations between words and concepts using the self-organizing map. In particular, we explore the meaning negotiations among communica...
Tiina Lindh-Knuutila, Timo Honkela, Krista Lagus
ICISC
2008
113views Cryptology» more  ICISC 2008»
13 years 10 months ago
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operatio...
Svetla Nikova, Vincent Rijmen, Martin Schläff...
SOSP
1997
ACM
13 years 10 months ago
Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs
Multi-threaded programming is difficult and error prone. It is easy to make a mistake in synchronization that produces a data race, yet it can be extremely hard to locate this mi...
Stefan Savage, Michael Burrows, Greg Nelson, Patri...
JCP
2008
171views more  JCP 2008»
13 years 8 months ago
Mining Frequent Subgraph by Incidence Matrix Normalization
Existing frequent subgraph mining algorithms can operate efficiently on graphs that are sparse, have vertices with low and bounded degrees, and contain welllabeled vertices and edg...
Jia Wu, Ling Chen
JNW
2006
63views more  JNW 2006»
13 years 8 months ago
MAC Contention in a Wireless LAN with Noncooperative Anonymous Stations
In ad hoc wireless LANs populated by mutually impenetrable groups of anonymous stations, honest stations are prone to "bandwidth stealing" by selfish stations. The proble...
Jerzy Konorski