Sciweavers

1327 search results - page 216 / 266
» Cost-Benefit Analysis of Software Development Techniques and...
Sort
View
ACSAC
2010
IEEE
14 years 7 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
LCTRTS
2010
Springer
15 years 2 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
13 years 6 days ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
COOPIS
1996
IEEE
15 years 1 months ago
A Methodology for Building a Data Warehouse in a Scientific Environment
Rational drug design is an example where integrated access to heterogeneous scientific data is urgently needed, as it becomes rapidly available due to new experimental and computa...
Karl Aberer, Klemens Hemm
SAC
1998
ACM
15 years 1 months ago
Object oriented process modeling with fuzzy logic
Fuzzy Logic has traditionally found an application in control theory, systems analysis, and artificial intelligence [9] [7]. However, it is very difficult to apply it to tradition...
Luigi Benedicenti, Giancarlo Succi, Tullio Vernazz...