Sciweavers

1734 search results - page 267 / 347
» What works
Sort
View
DATE
2004
IEEE
175views Hardware» more  DATE 2004»
14 years 2 months ago
Breaking Instance-Independent Symmetries in Exact Graph Coloring
Code optimization and high level synthesis can be posed as constraint satisfaction and optimization problems, such as graph coloring used in register allocation. Graph coloring is...
Arathi Ramani, Fadi A. Aloul, Igor L. Markov, Kare...
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
14 years 2 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
ISMIR
2000
Springer
146views Music» more  ISMIR 2000»
14 years 1 months ago
Perceptual and Cognitive Applications in Music Information Retrieval
Music librarians and cataloguers have traditionally created indexes that allow users to access musical works using standard reference information, such as the name of the composer...
David Huron
EUROCRYPT
1997
Springer
14 years 1 months ago
Oblivious Transfers and Privacy Amplification
Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-two string OT, a sender offers two strings, one of which the other party, called the receive...
Gilles Brassard, Claude Crépeau
SIGUCCS
2000
ACM
14 years 1 months ago
Opening Computing Labs, Opening Minds
The School of Architecture and Allied Arts at the University of Oregon consists of nine departments and programs with 5000 students, 160 faculty, and a few dozen staff. When I cam...
Christopher Jones