Sciweavers

6978 search results - page 1338 / 1396
» Reframing Requirements Analysis
Sort
View
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
15 years 1 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
CIKM
2006
Springer
15 years 1 months ago
Knowing a web page by the company it keeps
Web page classification is important to many tasks in information retrieval and web mining. However, applying traditional textual classifiers on web data often produces unsatisfyi...
Xiaoguang Qi, Brian D. Davison
CIKM
2006
Springer
15 years 1 months ago
Incorporating query difference for learning retrieval functions in world wide web search
We discuss information retrieval methods that aim at serving a diverse stream of user queries such as those submitted to commercial search engines. We propose methods that emphasi...
Hongyuan Zha, Zhaohui Zheng, Haoying Fu, Gordon Su...
EDOC
2006
IEEE
15 years 1 months ago
A conceptual framework for service modelling
This paper presents a conceptual framework for service modelling and refinement, called the COSMO (COnceptual Service MOdelling) framework. This framework provides concepts to mode...
Dick A. C. Quartel, Maarten W. A. Steen, Stanislav...
EMSOFT
2006
Springer
15 years 1 months ago
Multi-level software reconfiguration for sensor networks
In-situ reconfiguration of software is indispensable in embedded networked sensing systems. It is required for re-tasking a deployed network, fixing bugs, introducing new features...
Rahul Balani, Chih-Chieh Han, Ram Kumar Rengaswamy...
« Prev « First page 1338 / 1396 Last » Next »