Sciweavers

15779 search results - page 2916 / 3156
» Change-oriented software engineering
Sort
View
CSE
2009
IEEE
15 years 7 months ago
Web Science 2.0: Identifying Trends through Semantic Social Network Analysis
—We introduce a novel set of social network analysis based algorithms for mining the Web, blogs, and online forums to identify trends and find the people launching these new tren...
Peter A. Gloor, Jonas Krauss, Stefan Nann, Kai Fis...
78
Voted
DATE
2009
IEEE
81views Hardware» more  DATE 2009»
15 years 7 months ago
ReSim, a trace-driven, reconfigurable ILP processor simulator
— Modern processors are becoming more complex and as features and application size increase, their evaluation is becoming more time-consuming. To date, design space exploration r...
Sotiria Fytraki, Dionisios N. Pnevmatikatos
125
Voted
DSN
2009
IEEE
15 years 7 months ago
Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor
Dynamic Information Flow Tracking (DIFT) is a promising security technique. With hardware support, DIFT prevents a wide range of attacks on vulnerable software with minimal perfor...
Hari Kannan, Michael Dalton, Christos Kozyrakis
ICASSP
2009
IEEE
15 years 7 months ago
Small-group learning projects to make signal processing more appealing: From speech processing to OFDMA synchronization
Whereas lecturing is the most widely used mode of instruction, we have explored small-group learning projects to make signal processing more appealing at the University and in Eng...
G. Ferre, Audrey Giremus, Eric Grivel
112
Voted
RECONFIG
2009
IEEE
118views VLSI» more  RECONFIG 2009»
15 years 7 months ago
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Abstract. Protecting an implementation against Side Channel Analysis for Reverse Engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a fir...
Julien Bringer, Hervé Chabanne, Jean-Luc Da...
« Prev « First page 2916 / 3156 Last » Next »