Sciweavers

842 search results - page 132 / 169
» Open Implementation Design Guidelines
Sort
View
FDTC
2006
Springer
117views Cryptology» more  FDTC 2006»
15 years 1 months ago
DPA on Faulty Cryptographic Hardware and Countermeasures
Abstract. Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reli...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
83
Voted
CHI
1995
ACM
15 years 1 months ago
A Virtual Window on Media Space
The Virtual Window system uses head movements in a local office to control camera movement in a remote office. The result is like a window allowing exploration of remote scenes ra...
William W. Gaver, Gerda Smets, Kees Overbeeke
ERCIMDL
2009
Springer
193views Education» more  ERCIMDL 2009»
15 years 1 months ago
The Planets Interoperability Framework
We report on the implementation of a software infrastructure for preservation actions, carried out in the context of the European Integrated Project Planets – the Planets Interop...
Ross King, Rainer Schmidt, Andrew N. Jackson, Carl...
FAST
2010
15 years 2 days ago
Panache: A Parallel File System Cache for Global File Access
Cloud computing promises large-scale and seamless access to vast quantities of data across the globe. Applications will demand the reliability, consistency, and performance of a t...
Marc Eshel, Roger L. Haskin, Dean Hildebrand, Mano...
USS
2008
15 years 1 days ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May