Sciweavers

7380 search results - page 1406 / 1476
» time 2008
Sort
View
158
Voted
ICCD
2008
IEEE
221views Hardware» more  ICCD 2008»
16 years 28 days ago
Reversi: Post-silicon validation system for modern microprocessors
— Verification remains an integral and crucial phase of today’s microprocessor design and manufacturing process. Unfortunately, with soaring design complexities and decreasing...
Ilya Wagner, Valeria Bertacco
ICCAD
2008
IEEE
133views Hardware» more  ICCAD 2008»
16 years 26 days ago
Module locking in biochemical synthesis
—We are developing a framework for computation with biochemical reactions with a focus on synthesizing specific logical functionality, a task analogous to technology-independent...
Brian Fett, Marc D. Riedel
WISEC
2010
ACM
15 years 11 months ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko
134
Voted
TCC
2010
Springer
163views Cryptology» more  TCC 2010»
15 years 11 months ago
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs
Introduced by Micali, Rabin and Kilian (MRK), the basic primitive of zero-knowledge sets (ZKS) allows a prover to commit to a secret set S so as to be able to prove statements such...
Benoît Libert, Moti Yung
INFOCOM
2009
IEEE
15 years 10 months ago
Mining the Web and the Internet for Accurate IP Address Geolocations
In this paper, we present Structon, a novel approach that uses Web mining together with inference and IP traceroute to geolocate IP addresses with significantly better accuracy t...
Chuanxiong Guo, Yunxin Liu, Wenchao Shen, Helen J....
« Prev « First page 1406 / 1476 Last » Next »