Sciweavers

861 search results - page 90 / 173
» Internal implementation
Sort
View
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
14 years 12 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
SIGMOD
2005
ACM
156views Database» more  SIGMOD 2005»
15 years 10 months ago
Model-driven design of service-enabled web applications
Significant efforts are currently invested in application integration to enable the interaction and composition of business processes of different companies, yielding complex, mul...
Marco Brambilla, Stefano Ceri, Piero Fraternali, R...
SEKE
2007
Springer
15 years 4 months ago
Performance Analysis of the Active Object Pattern in Middleware
A number of enterprises are turning towards the Service Oriented Architecture (SOA) approach for their systems due to the number of benefits it offers. A key enabling technology ...
Paul J. Vandal, Swapna S. Gokhale, Aniruddha S. Go...
ECIS
2003
14 years 11 months ago
Positivist single case study research in information systems: a critical analysis
Positivist, single case study is an important research approach within the information systems discipline. This paper provides detailed definitions of key concepts in positivist, ...
Graeme G. Shanks, Anne N. Parr
OTM
2007
Springer
15 years 4 months ago
Reduction Transformations in ORM
Abstract: This paper proposes extensions to the Object-Role Modeling approach to support schema transformations that eliminate unneeded columns that may arise from standard relatio...
Terry A. Halpin, Andy Carver, Kevin M. Owen