Sciweavers

947 search results - page 105 / 190
» Analysis of Techniques to Improve Protocol Processing Latenc...
Sort
View
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 7 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
ICIP
2005
IEEE
16 years 3 months ago
Exploiting discriminant information in elastic graph matching
In this paper, we investigate the use of discriminant techniques in the elastic graph matching (EGM) algorithm. First we use discriminant analysis in the feature vectors of the no...
Stefanos Zafeiriou, Anastasios Tefas, Ioannis Pita...
XPU
2004
Springer
15 years 6 months ago
Project Management and Agile Methodologies: A Survey
Abstract. This paper examines analogies and differences derived by the adoption of Agile Methodologies (AMs) in a set of software companies from the point of view of project manage...
Michela Dall'Agnol, Alberto Sillitti, Giancarlo Su...
USENIX
2000
15 years 2 months ago
Pandora: A Flexible Network Monitoring Platform
This paper presents Pandora, a network monitoring platform that captures packets using purely passive techniques. Pandora addresses current needs for improving Internet middleware...
Simon Patarin, Mesaac Makpangou
ICAPR
2005
Springer
15 years 7 months ago
Fingerprint Image Enhancement Using STFT Analysis
Contrary to popular belief, despite decades of research in fingerprints, reliable fingerprint recognition is an open problem. Extracting features out of poor quality prints is t...
Sharat Chikkerur, Venu Govindaraju, Alexander N. C...