Sciweavers

931 search results - page 171 / 187
» Controlled Experimentation with Agents - Models and Implemen...
Sort
View
CHES
2009
Springer
239views Cryptology» more  CHES 2009»
16 years 6 days ago
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its ph...
François-Xavier Standaert, Mathieu Renauld,...
POPL
2006
ACM
15 years 12 months ago
Harmless advice
This paper defines an object-oriented language with harmless aspect-oriented advice. A piece of harmless advice is a computation that, like ordinary aspect-oriented advice, execut...
Daniel S. Dantas, David Walker
SIGMOD
2007
ACM
105views Database» more  SIGMOD 2007»
15 years 11 months ago
An XML transaction processing benchmark
XML database functionality has been emerging in "XML-only" databases as well as in the major relational database products. Yet, there is no industry standard XML databas...
Matthias Nicola, Irina Kogan, Berni Schiefer
ICFP
2005
ACM
15 years 11 months ago
Acute: high-level programming language design for distributed computation
Existing languages provide good support for typeful programming of standalone programs. In a distributed system, however, there may be interaction between multiple instances of ma...
Peter Sewell, James J. Leifer, Keith Wansbrough, F...
SIGCOMM
2009
ACM
15 years 6 months ago
A programmable overlay router for service provider innovation
The threat of commoditization poses a real challenge for service providers. While the end-to-end principle is often paraphrased as “dumb network, smart end-systems”, the origi...
Bruce S. Davie, Jan Medved