Sciweavers

1369 search results - page 229 / 274
» A Practical Implementation of the Timing Attack
Sort
View
101
Voted
OTM
2010
Springer
14 years 9 months ago
Context-Aware Tuples for the Ambient
In tuple space approaches to context-aware mobile systems, the notion of context is defined by the presence or absence of certain tuples in the tuple space. Existing approaches de...
Christophe Scholliers, Elisa Gonzalez Boix, Wolfga...
WABI
2010
Springer
188views Bioinformatics» more  WABI 2010»
14 years 9 months ago
Prediction of RNA Secondary Structure Including Kissing Hairpin Motifs
Abstract. We present three heuristic strategies for folding RNA sequences into secondary structures including kissing hairpin motifs. The new idea is to construct a kissing hairpin...
Corinna Theis, Stefan Janssen, Robert Giegerich
GLOBECOM
2010
IEEE
14 years 9 months ago
Independent Parallel Compact Finite Automatons for Accelerating Multi-String Matching
Multi-string matching is a key technique for implementing network security applications like Network Intrusion Detection Systems (NIDS) and anti-virus scanners. Existing DFA-based ...
Yi Tang, Junchen Jiang, Xiaofei Wang, Bin Liu, Yan...
102
Voted
IMC
2010
ACM
14 years 8 months ago
Flowroute: inferring forwarding table updates using passive flow-level measurements
The reconvergence of routing protocols in response to changes in network topology can impact application performance. While improvements in protocol specification and implementati...
Amogh Dhamdhere, Lee Breslau, Nick G. Duffield, Ch...
SIES
2010
IEEE
14 years 8 months ago
Verification of a CAN bus model in SystemC with functional coverage
Abstract--Many heterogeneous embedded systems, for example industrial automation and automotive applications, require hard-real time constraints to be exhaustively verified - which...
Christoph Kuznik, Gilles B. Defo, Wolfgang Mü...