Sciweavers

1086 search results - page 153 / 218
» Points surrounding the origin
Sort
View
CHES
2000
Springer
111views Cryptology» more  CHES 2000»
15 years 4 months ago
How to Explain Side-Channel Leakage to Your Kids
This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three diļ¬...
David Naccache, Michael Tunstall
IEEEARES
2010
IEEE
15 years 4 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
DAC
1999
ACM
15 years 4 months ago
Exact Memory Size Estimation for Array Computations without Loop Unrolling
This paper presents a new algorithm for exact estimation of the minimum memory size required by programs dealing with array computations. Memory size is an important factor a ecti...
Ying Zhao, Sharad Malik
MM
1999
ACM
151views Multimedia» more  MM 1999»
15 years 4 months ago
Auto-summarization of audio-video presentations
As streaming audio-video technology becomes widespread, there is a dramatic increase in the amount of multimedia content available on the net. Users face a new challenge: How to e...
Liwei He, Elizabeth Sanocki, Anoop Gupta, Jonathan...
ISADS
1999
IEEE
15 years 4 months ago
CORBA based Architecture for Large Scale Workflow
Standard client-server workflow management systems have an intrinsic scalability limitation, the central server, which represents a bottleneck for large-scale applications. This s...
Roberto Silveira Silva Filho, Jacques Wainer, Edmu...