Sciweavers

2984 search results - page 268 / 597
» Method engineering process patterns
Sort
View
JOC
2010
92views more  JOC 2010»
14 years 9 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
APSEC
2003
IEEE
15 years 7 months ago
PAORE: Package Oriented Requirements Elicitation
We propose a new requirements elicitation method in such a domain of ERP, CRM, and SCM by using specifications of several existing package software. We have analyzed the requirem...
Junzo Kato, Morio Nagata, Shuichiro Yamamoto, Moto...
ARCS
2012
Springer
13 years 10 months ago
Improving Cache Locality for Ray Casting with CUDA
Abstract: In this paper, we present an acceleration method for texture-based ray casting on the compute unified device architecture (CUDA) compatible graphics processing unit (GPU...
Yuki Sugimoto, Fumihiko Ino, Kenichi Hagihara
NSPW
2004
ACM
15 years 7 months ago
Towards agile security assurance
Agile development methodologies are gaining acceptance in the software industry. If they are to be used for constructing securitycritical solutions, what do we do about assurance?...
Konstantin Beznosov, Philippe Kruchten
CPM
2007
Springer
94views Combinatorics» more  CPM 2007»
15 years 8 months ago
Finding Witnesses by Peeling
In the k-matches problem, we are given a pattern and a text, and for each text location, the desired output consists of all aligned matching characters if there are k or fewer of ...
Yonatan Aumann, Moshe Lewenstein, Noa Lewenstein, ...