Sciweavers

623 search results - page 104 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
ICMCS
2006
IEEE
82views Multimedia» more  ICMCS 2006»
15 years 9 months ago
PING: a Group-to-Individual Distributed Meeting System
Group-to-individual (G2I) distributed meeting is an important but understudied area. Because of the asymmetry between different parties in G2I meetings, it has two unique challeng...
Yong Rui, Eric Rudolph, Li-wei He, Rico Malvar, Mi...
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
15 years 8 months ago
Developing Video Services for Mobile Users
Video information, image processing and computer vision techniques are developing rapidly nowadays because of the availability of acquisition, processing and editing tools, which ...
Mohamed Ahmed, Roger Impey, Ahmed Karmouch
SIGSOFT
2003
ACM
16 years 4 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
182
Voted
OOPSLA
2007
Springer
15 years 9 months ago
Component nextgen: a sound and expressive component framework for java
Developing a general component system for a statically typed, object-oriented language is a challenging design problem for two reasons. First, mutually recursive references across...
James Sasitorn, Robert Cartwright
126
Voted
ISCA
2007
IEEE
110views Hardware» more  ISCA 2007»
15 years 9 months ago
Late-binding: enabling unordered load-store queues
Conventional load/store queues (LSQs) are an impediment to both power-efficient execution in superscalar processors and scaling to large-window designs. In this paper, we propose...
Simha Sethumadhavan, Franziska Roesner, Joel S. Em...