Sciweavers

12487 search results - page 281 / 2498
» Graspable Work Modeling
Sort
View
CHES
2011
Springer
271views Cryptology» more  CHES 2011»
14 years 4 months ago
Modulus Fault Attacks against RSA-CRT Signatures
RSA-CRT fault attacks have been an active research area since their discovery by Boneh, DeMillo and Lipton in 1997. We present alternative key-recovery attacks on RSA-CRT signature...
Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi...
151
Voted
WSDM
2012
ACM
295views Data Mining» more  WSDM 2012»
14 years 4 days ago
A straw shows which way the wind blows: ranking potentially popular items from early votes
Prediction of popular items in online content sharing systems has recently attracted a lot of attention due to the tremendous need of users and its commercial values. Different fr...
Peifeng Yin, Ping Luo, Min Wang, Wang-Chien Lee
167
Voted
MODELS
2009
Springer
15 years 9 months ago
On-the-Fly Construction, Correctness and Completeness of Model Transformations Based on Triple Graph Grammars
Triple graph grammars (TGGs) are a formal and intuitive concept for the specification of model transformations. Their main advantage is an automatic derivation of operational rule...
Hartmut Ehrig, Claudia Ermel, Frank Hermann, Ulrik...
114
Voted
DSML
2008
107views Formal Methods» more  DSML 2008»
15 years 6 months ago
How Web 2.0 can Leverage Model Engineering in Practice
: Today's online model repositories offer to download and view the textual specifications of e.g. metamodels and models in the browser. For users, in order to efficiently sear...
Manuel Wimmer, Andrea Schauerhuber, Michael Stromm...
MASCOTS
2007
15 years 6 months ago
Network Performance Analysis based on Histogram Workload Models
Network performance analysis relies mainly on two models: a workload model and a performance model. This paper proposes to use histograms for characterising the arrival workloads ...
Enrique Hernández-Orallo, Joan Vila-Carb&oa...