Sciweavers

42388 search results - page 8327 / 8478
» Classification Using Information
Sort
View
107
Voted
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
15 years 8 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
130
Voted
HT
2010
ACM
15 years 7 months ago
Parallel browsing behavior on the web
Parallel browsing describes a behavior where users visit Web pages in multiple concurrent threads. Web browsers explicitly support this by providing tabs. Although parallel browsi...
Jeff Huang, Ryen W. White
132
Voted
PLDI
2010
ACM
15 years 7 months ago
Mixing type checking and symbolic execution
Static analysis designers must carefully balance precision and efficiency. In our experience, many static analysis tools are built around an elegant, core algorithm, but that alg...
Yit Phang Khoo, Bor-Yuh Evan Chang, Jeffrey S. Fos...
146
Voted
ACSAC
2002
IEEE
15 years 7 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
124
Voted
DSN
2002
IEEE
15 years 7 months ago
Ditto Processor
Concentration of design effort for current single-chip Commercial-Off-The-Shelf (COTS) microprocessors has been directed towards performance. Reliability has not been the primary ...
Shih-Chang Lai, Shih-Lien Lu, Jih-Kwon Peir
« Prev « First page 8327 / 8478 Last » Next »