Sciweavers

15779 search results - page 2551 / 3156
» Change-oriented software engineering
Sort
View
NTMS
2008
IEEE
15 years 11 months ago
Offline Approach to Modeling and Optimization of Flows in Peer-to-Peer Systems
—Peer-to-Peer (P2P) systems gain much attention in recent years. According to many statistics, P2P systems contribute a significant portion of the Internet traffic. Individual In...
Krzysztof Walkowiak
CODES
2007
IEEE
15 years 11 months ago
A smart random code injection to mask power analysis based side channel attacks
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...
CODES
2007
IEEE
15 years 11 months ago
Dynamic security domain scaling on symmetric multiprocessors for future high-end embedded systems
We propose a method for dynamic security domain scaling on SMPs that offers both highly scalable performance and high security for future high-end embedded systems. Its most impor...
Hiroaki Inoue, Akihisa Ikeno, Tsuyoshi Abe, Junji ...
COMSWARE
2007
IEEE
15 years 11 months ago
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
The Elliptic Curve Digital Signature Algorithm admits a natural parallelization wherein the point multiplication step can be split in two parts and executed in parallel. Further pa...
Sarang Aravamuthan, Viswanatha Rao Thumparthy
COMSWARE
2007
IEEE
15 years 11 months ago
Sensor Network Deployment For Agronomical Data Gathering in Semi-Arid Regions
— We share our experience in planning, designing and deploying a wireless sensor network of one square kilometre area. Environmental data such as soil moisture, temperature, baro...
Tamma V. Prabhakar, N. V. Chalapathi Rao, M. S. Su...
« Prev « First page 2551 / 3156 Last » Next »