Sciweavers

42388 search results - page 8352 / 8478
» Classification Using Information
Sort
View
CHES
2004
Springer
216views Cryptology» more  CHES 2004»
15 years 6 months ago
Efficient Countermeasures against RPA, DPA, and SPA
In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel a...
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
125
Voted
ASPLOS
2006
ACM
15 years 6 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
137
Voted
ATAL
2006
Springer
15 years 6 months ago
Learning the task allocation game
The distributed task allocation problem occurs in domains like web services, the grid, and other distributed systems. In this problem, the system consists of servers and mediators...
Sherief Abdallah, Victor R. Lesser
162
Voted
ATAL
2006
Springer
15 years 6 months ago
RPD-enabled agents teaming with humans for multi-context decision making
Team decision making under stress involving multiple contexts is an extremely challenging issue faced by various real world application domains. This research is targeted at coupl...
Xiaocong Fan, Bingjun Sun, Shuang Sun, Michael D. ...
133
Voted
ATAL
2006
Springer
15 years 6 months ago
Magenta technology multi-agent logistics i-Scheduler for road transportation
The paper describes main features of an Intelligent Scheduler for Road Transportation Applications based on Magenta agent technology and characterized by a number of unique, advan...
Jonathan Himoff, George Rzevski, Petr Skobelev
« Prev « First page 8352 / 8478 Last » Next »