Sciweavers

1974 search results - page 334 / 395
» A Library System for Small-Scale Library
Sort
View
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
15 years 3 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
ISCA
2006
IEEE
125views Hardware» more  ISCA 2006»
15 years 3 months ago
Architectural Semantics for Practical Transactional Memory
Transactional Memory (TM) simplifies parallel programming by allowing for parallel execution of atomic tasks. Thus far, TM systems have focused on implementing transactional stat...
Austen McDonald, JaeWoong Chung, Brian D. Carlstro...
CD
2004
Springer
15 years 3 months ago
Dynamic Deployment of Executing and Simulating Software Components
Physical boundaries have caused software systems to become less monolithic and more distributed. The trend is progressing to a point where software systems will consist of numerous...
Alexander Egyed
ESEC
1999
Springer
15 years 2 months ago
Synergy between Component-Based and Generative Approaches
Building software systems out of pre-fabricated components is a very attractive vision. Distributed Component Platforms (DCP) and their visual development environments bring this v...
Stan Jarzabek, Peter Knauber
AISC
1998
Springer
15 years 2 months ago
Reasoning About Coding Theory: The Benefits We Get from Computer Algebra
The use of computer algebra is usually considered beneficial for mechanised reasoning in mathematical domains. We present a case study, in the application domain of coding theory, ...
Clemens Ballarin, Lawrence C. Paulson