Sciweavers

7651 search results - page 1309 / 1531
» Information integration in the enterprise
Sort
View
DAC
2007
ACM
15 years 5 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
DEBS
2007
ACM
15 years 5 months ago
A system for semantic data fusion in sensor networks
Emerging sensor network technologies are expected to substantially augment applications such as environmental monitoring, health-care, and home/commercial automation. However, muc...
Alex Wun, Milenko Petrovic, Hans-Arno Jacobsen
DPPI
2007
ACM
15 years 5 months ago
Exploring design concepts for sharing experiences through digital photography
In this research, we aim to explore meaningful design directions for future photography applications with a focus on the experiences around sharing. We review a wide-rage of photo-...
Heekyoung Jung, Kay Connelly
161
Voted
ECLIPSE
2007
ACM
15 years 5 months ago
Building, deploying, and monitoring distributed applications with Eclipse and R-OSGI
Designing and testing distributed applications is still a difficult task that requires in-depth knowledge about networking issues. Eclipse is, among other things, a powerful and w...
Jan S. Rellermeyer, Gustavo Alonso, Timothy Roscoe
DAC
2010
ACM
15 years 5 months ago
Representative path selection for post-silicon timing prediction under variability
The identification of speedpaths is required for post-silicon (PS) timing validation, and it is currently becoming timeconsuming due to manufacturing variations. In this paper we...
Lin Xie, Azadeh Davoodi
« Prev « First page 1309 / 1531 Last » Next »