Sciweavers

243 search results - page 33 / 49
» A Computational Model of Empathy: Empirical Evaluation
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 5 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
CSE
2009
IEEE
15 years 3 months ago
Quantifying Utility and Trustworthiness for Advice Shared on Online Social Media
—The growing popularity of social media in recent years has resulted in the creation of an enormous amount of user-developed content. While information is readily available, ther...
Sai T. Moturu, Jian Yang, Huan Liu
KBSE
2010
IEEE
14 years 9 months ago
A program differencing algorithm for verilog HDL
During code review tasks, comparing two versions of a hardware design description using existing program differencing tools such as diff is inherently limited because existing p...
Adam Duley, Chris Spandikow, Miryung Kim
MOBISYS
2004
ACM
15 years 10 months ago
Impact of Radio Irregularity on Wireless Sensor Networks
In this paper, we investigate the impact of radio irregularity on the communication performance in wireless sensor networks. Radio irregularity is a common phenomenon which arises...
Gang Zhou, Tian He, Sudha Krishnamurthy, John A. S...
CONEXT
2009
ACM
14 years 12 months ago
Greening the internet with nano data centers
Motivated by increased concern over energy consumption in modern data centers, we propose a new, distributed computing platform called Nano Data Centers (NaDa). NaDa uses ISP-cont...
Vytautas Valancius, Nikolaos Laoutaris, Laurent Ma...