Sciweavers

12493 search results - page 2248 / 2499
» Information Access in the Web
Sort
View
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
15 years 7 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
COMPSAC
2003
IEEE
15 years 7 months ago
Data-Flow-Based Unit Testing of Aspect-Oriented Programs
The current research so far in aspect-oriented software development is focused on problem analysis, software design, and implementation techniques. Even though the importance of s...
Jianjun Zhao
EDOC
2003
IEEE
15 years 7 months ago
MQL: a Powerful Extension to OCL for MOF Queries
The Meta-Object Facility (MOF) provides a standardised framework for object-oriented models. An instance of a MOF model contains objects and links whose interfaces are entirely de...
David Hearnden, Kerry Raymond, Jim Steel
EDOC
2003
IEEE
15 years 7 months ago
An Agent-based Architecture for Analyzing Business Processes of Real-Time Enterprises
As the desire for business intelligence capabilities for e-business processes expands, existing workflow management systems and decision support systems are not able to provide co...
Jun-Jang Jeng, Josef Schiefer, Henry Chang
HICSS
2003
IEEE
178views Biometrics» more  HICSS 2003»
15 years 7 months ago
A Contract and Rights Management Framework Design for Interacting Brokers
Contract and rights management – and thus property rights protection – has gained increasing importance as a quality standard in brokerage and electronic commerce environments...
Susanne Guth, Bernd Simon, Uwe Zdun
« Prev « First page 2248 / 2499 Last » Next »