Sciweavers

481 search results - page 82 / 97
» Differential symbolic execution
Sort
View
DAC
2005
ACM
15 years 11 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
IICS
2009
Springer
15 years 4 months ago
Web 2.0 as an Autopoietic System - Implications for Innovative Web-Interfaces
: The Web 2.0 can be regarded as an evolutionary process of medial differentiation. Infinite online communities are emerging and disappearing. It seems that a race has started in s...
Kathrin Vent
MOBILWARE
2009
ACM
15 years 4 months ago
Middleware Solutions for Self-organizing Multi-hop Multi-path Internet Connectivity Based on Bluetooth
The availability of heterogeneous wireless interfaces and of growing computing resources on widespread portable devices pushes for enabling innovative deployment scenarios where mo...
Paolo Bellavista, Carlo Giannelli
ICPP
2008
IEEE
15 years 4 months ago
Memory Access Scheduling Schemes for Systems with Multi-Core Processors
On systems with multi-core processors, the memory access scheduling scheme plays an important role not only in utilizing the limited memory bandwidth but also in balancing the pro...
Hongzhong Zheng, Jiang Lin, Zhao Zhang, Zhichun Zh...
PDP
2008
IEEE
15 years 4 months ago
A Transformation Framework for Communicating Multiprocessor-Tasks
Parallel programming models based on a mixture of task and data parallelism have shown to be successful in addressing the increasing communication overhead of distributed memory p...
Jörg Dümmler, Thomas Rauber, Gudula R&uu...