Sciweavers

2740 search results - page 333 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
114
Voted
DEXAW
2003
IEEE
131views Database» more  DEXAW 2003»
15 years 9 months ago
Privacy and Trusted Computing
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user ...
Juan Manuel González Nieto, Ed Dawson, Eiji...
146
Voted
SBACPAD
2003
IEEE
121views Hardware» more  SBACPAD 2003»
15 years 9 months ago
Optimizing Packet Capture on Symmetric Multiprocessing Machines
Traffic monitoring and analysis based on general purpose systems with high speed interfaces, such as Gigabit Ethernet and 10 Gigabit Ethernet, requires carefully designed software...
Gianluca Varenni, Mario Baldi, Loris Degioanni, Fu...
101
Voted
WETICE
2003
IEEE
15 years 9 months ago
Using Design Rationales for Agile Documentation
Recently, Agile Software Processes have been discussed as flexible and light-weight alternatives to established Software Engineering approaches, in order to overcome the obstacles...
Thomas Sauer
127
Voted
KCAP
2003
ACM
15 years 9 months ago
Modularisation of domain ontologies implemented in description logics and related formalisms including OWL
Modularity is a key requirement for large ontologies in order to achieve re-use, maintainability, and evolution. Mechanisms for ‘normalisation’ to achieve analogous aims are s...
Alan L. Rector
CHES
2003
Springer
115views Cryptology» more  CHES 2003»
15 years 8 months ago
The Doubling Attack - Why Upwards Is Better than Downwards
The recent developments of side channel attacks have lead implementers to use more and more sophisticated countermeasures in critical operations such as modular exponentiation, or ...
Pierre-Alain Fouque, Frédéric Valett...