Sciweavers

1137 search results - page 155 / 228
» Disciplined Methods of Software Specification: A Case Study
Sort
View
ACMDIS
2004
ACM
15 years 3 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
AOSD
2007
ACM
15 years 1 months ago
Debugging with control-flow breakpoints
Modern source-level debuggers support dynamic breakpoints that are guarded by conditions based on program state. Such breakpoints address situations where a static breakpoint is n...
Rick Chern, Kris De Volder
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
14 years 11 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...
ECBS
2008
IEEE
115views Hardware» more  ECBS 2008»
15 years 4 months ago
Optimizing Design for Variability Using Traceability Links
Software systems have to provide flexibility by implementing variability. Existing design methodologies do not support means for optimizing the design for variability and for mea...
Matthias Riebisch, Robert Brcina
CASES
2007
ACM
15 years 1 months ago
Scratch-pad memory allocation without compiler support for java applications
ABSTRACT This paper presents the first scratch-pad memory allocation scheme that requires no compiler support for interpreted-language based applications. A scratch-pad memory (SPM...
Nghi Nguyen, Angel Dominguez, Rajeev Barua