default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 600 matches
- 2024
- Erik Daniel, Florian Tschorsch:
Exploring the design space of privacy-enhanced content discovery for bitswap. Comput. Commun. 217: 12-24 (2024) - Shaowei Wang, Guangjun Xie, Wenbing Xu, Yongqiang Zhang, Jie Han:
A Low-Cost and Fault-Tolerant Stochastic Architecture for the Bernsen Algorithm Using Bitstream Correlation. J. Circuits Syst. Comput. 33(9) (2024) - Reynaldo Cáceres Villena, Routo Terada:
Recovery of the secret on Binary Ring-LWE problem using random known bits - Extended Version. J. Internet Serv. Appl. 15(1): 39-45 (2024) - Elette Boyle, Ran Cohen, Aarushi Goel:
Breaking the $O(\sqrt{n})$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party. J. Cryptol. 37(1): 2 (2024) - Mustafa Dogan, Kasim Öztoprak, Mehmet Resit Tolun:
Teaching computer architecture by designing and simulating processors from their bits and bytes. PeerJ Comput. Sci. 10: e1818 (2024) - Fan He, Xiangjun Xin, Chaoyang Li, Fagen Li:
Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement. Quantum Inf. Process. 23(2): 51 (2024) - Vicki Bitsika, Christopher F. Sharpley, Kirstan A. Vessey, Ian D. Evans:
Sex-Based Asymmetry in the Association between Challenging Behaviours and Five Anxiety Disorders in Autistic Youth. Symmetry 16(5): 591 (2024) - Marios Adamoudis, Konstantinos A. Draziotis, Dimitrios Poulakis:
Attacking (EC)DSA scheme with ephemeral keys sharing specific bits. Theor. Comput. Sci. 1001: 114578 (2024) - Sabyasachi Dey:
Advancing the Idea of Probabilistic Neutral Bits: First Key Recovery Attack on 7.5 Round ChaCha. IEEE Trans. Inf. Theory 70(8): 6091-6106 (2024) - Guodong Li, Min Ye, Sihuang Hu:
ABS+ Polar Codes: Exploiting More Linear Transforms on Adjacent Bits. IEEE Trans. Inf. Theory 70(2): 1067-1086 (2024) - Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna:
Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes. J. Comput. Virol. Hacking Tech. 20(1): 195-202 (2024) - Endres Puschner, Maik Ender, Steffen Becker, Christof Paar:
Patching FPGAs: The Security Implications of Bitstream Modifications. ASHES@CCS 2024: 89-99 - Daniel Dakota, Sandra Kübler:
Bits and Pieces: Investigating the Effects of Subwords in Multi-task Parsing across Languages and Domains. LREC/COLING 2024: 2397-2409 - Moritz Pfister, Robert Michael, Max Boll, Cosima Körfer, Konrad Rieck, Daniel Arp:
Listening Between the Bits: Privacy Leaks in Audio Fingerprints. DIMVA 2024: 184-204 - Václav Pavlícek, Ruiming Guo, Ayush Bhandari:
Bits, Channels, Frequencies and Unlimited Sensing: Pushing the Limits of Sub-Nyquist Prony. EUSIPCO 2024: 2462-2466 - Shivam Aggarwal, Hans Jakob Damsgaard, Alessandro Pappalardo, Giuseppe Franco, Thomas B. Preußer, Michaela Blott, Tulika Mitra:
Shedding the Bits: Pushing the Boundaries of Quantization with Minifloats on FPGAs. FPL 2024: 297-303 - Jordan Dotzel, Bahaa Kotb, James Dotzel, Mohamed S. Abdelfattah, Zhiru Zhang:
Exploring the Limits of Semantic Image Compression at Micro-bits per Pixel. Tiny Papers @ ICLR 2024 - Ziying Ni, Ayesha Khalid, Weiqiang Liu, Máire O'Neill:
FPGA Bitstream Fault Injection Attack and Countermeasures on the Sampling Counter in CRYSTALS Kyber. ISCAS 2024: 1-5 - Syed Khandker, Michele Guerra, Evangelos Bitsikas, Roger Piqueras Jover, Aanjhan Ranganathan, Christina Pöpper:
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices. WISEC 2024: 89-100 - Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan:
Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks. WOOT @ USENIX Security Symposium 2024: 59-73 - Jordan Dotzel, Bahaa Kotb, James Dotzel, Mohamed S. Abdelfattah, Zhiru Zhang:
Exploring the Limits of Semantic Image Compression at Micro-bits per Pixel. CoRR abs/2402.13536 (2024) - Shuming Ma, Hongyu Wang, Lingxiao Ma, Lei Wang, Wenhui Wang, Shaohan Huang, Li Dong, Ruiping Wang, Jilong Xue, Furu Wei:
The Era of 1-bit LLMs: All Large Language Models are in 1.58 Bits. CoRR abs/2402.17764 (2024) - Itai Shufaro, Nadav Merlis, Nir Weinberger, Shie Mannor:
On Bits and Bandits: Quantifying the Regret-Information Trade-off. CoRR abs/2405.16581 (2024) - Jenilee Jao, Kristi Hoffman, Cheryl Reid, Ryan Thomson, Michael Thompson, Jim Plusquellic:
Statistical Quality Comparison of the Bitstrings Generated by a Physical Unclonable Function across Xilinx, Altera and Microsemi Devices. CoRR abs/2408.06463 (2024) - Mare Hirose, Shoko Imaizumi, Hitoshi Kiya:
On the Security of Bitstream-level JPEG Encryption with Restart Markers. CoRR abs/2410.06522 (2024) - Yongxiang Li, Shiqing Wang, Zhong Sun:
The maximum storage capacity of open-loop written RRAM is around 4 bits. CoRR abs/2410.20332 (2024) - Kieran A. Murphy, Zhuowen Yin, Dani S. Bassett:
Which bits went where? Past and future transfer entropy decomposition with the information bottleneck. CoRR abs/2411.04992 (2024) - Endres Puschner, Maik Ender, Steffen Becker, Christof Paar:
Patching FPGAs: The Security Implications of Bitstream Modifications. CoRR abs/2411.11060 (2024) - 2023
- Rakesh Rao Ramachandra Rao:
Bitstream-based video quality modeling and analysis of HTTP-based adaptive streaming. Technische Universität Ilmenau, Germany, TU Ilmenau 2023 - Bo Zhang, Qi Wang, Xiaolei Yu, Qianhui Li, Jing He, Xianliang Wang, Qianqi Zhao, Xuhong Qiang, Zongliang Huo, Tianchun Ye:
FBEL: Enhanced LLR optimization algorithm based on the VSER prediction by flag bits in the bit-flipping scheme. IEICE Electron. Express 20(11): 20230113 (2023)
skipping 570 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-19 13:18 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint