Sciweavers

6413 search results - page 80 / 1283
» Classes of cycle bases
Sort
View
94
Voted
DATE
2009
IEEE
97views Hardware» more  DATE 2009»
15 years 7 months ago
A flexible floating-point wavelet transform and wavelet packet processor
—The richness of wavelet transformation is known in many fields. There exist different classes of wavelet filters that can be used depending on the application. In this paper, ...
Andre Guntoro, Manfred Glesner
89
Voted
ACSAC
2008
IEEE
15 years 7 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
108
Voted
NOMS
2008
IEEE
107views Communications» more  NOMS 2008»
15 years 7 months ago
A Framework for the establishment of inter-domain, on-demand VPNs
– Virtual Private Networks (VPNs) are a popular and cost-effective means to build wide-area corporate networks, since they provide bandwidth, privacy and security for a fraction ...
Alexandre Matos, Fernando Matos, Paulo Simõ...
103
Voted
SEKE
2007
Springer
15 years 6 months ago
Performance Analysis of the Active Object Pattern in Middleware
A number of enterprises are turning towards the Service Oriented Architecture (SOA) approach for their systems due to the number of benefits it offers. A key enabling technology ...
Paul J. Vandal, Swapna S. Gokhale, Aniruddha S. Go...
94
Voted
CHES
2005
Springer
82views Cryptology» more  CHES 2005»
15 years 6 months ago
Masking at Gate Level in the Presence of Glitches
Abstract. It has recently been shown that logic circuits in the implementation of cryptographic algorithms, although protected by “secure” random masking schemes, leak side-cha...
Wieland Fischer, Berndt M. Gammel