Sciweavers

13004 search results - page 2456 / 2601
» Mining Software Data
Sort
View
CASES
2009
ACM
15 years 8 months ago
Side channel analysis of AVR XMEGA crypto engine
AVR XMEGA is the recent general-purpose 8-bit microcontroller from Atmel featuring symmetric crypto engines. We analyze the resistance of XMEGA crypto engines to side channel atta...
Ilya Kizhvatov
GPCE
2009
Springer
15 years 8 months ago
Advanced runtime adaptation for Java
Dynamic aspect-oriented programming (AOP) enables runtime adaptation of aspects, which is important for building sophisticated, aspect-based software engineering tools, such as ad...
Alex Villazón, Walter Binder, Danilo Ansalo...
HOLOMAS
2009
Springer
15 years 8 months ago
Mobility Model for Tactical Networks
In this paper a synthetic mobility model which represents behavior and movement pattern of heterogeneous units in disaster relief and battlefield scenarios is proposed. These oper...
Milan Rollo, Antonín Komenda
IH
2001
Springer
15 years 8 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
JAVA
2001
Springer
15 years 8 months ago
Runtime optimizations for a Java DSM implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. Jackal implements Java’s memory model and allows multithreaded Java programs...
Ronald Veldema, Rutger F. H. Hofman, Raoul Bhoedja...
« Prev « First page 2456 / 2601 Last » Next »