Sciweavers

5457 search results - page 1041 / 1092
» Software Component Independence
Sort
View
101
Voted
EWSN
2010
Springer
15 years 9 months ago
Phoenix: An Epidemic Approach to Time Reconstruction
Abstract. Harsh deployment environments and uncertain run-time conditions create numerous challenges for postmortem time reconstruction methods. For example, motes often reboot and...
Jayant Gupchup, Douglas Carlson, Razvan Musaloiu-E...
92
Voted
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
15 years 9 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
ICCD
2006
IEEE
97views Hardware» more  ICCD 2006»
15 years 9 months ago
Pesticide: Using SMT Processors to Improve Performance of Pointer Bug Detection
Pointer bugs associated with dynamically-allocated objects resulting in out-of-bounds memory access are an important class of software bugs. Because such bugs cannot be detected e...
Jin-Yi Wang, Yen-Shiang Shue, T. N. Vijaykumar, Sa...
MIR
2010
ACM
167views Multimedia» more  MIR 2010»
15 years 7 months ago
Improving automatic music classification performance by extracting features from different types of data
This paper discusses two sets of automatic musical genre classification experiments. Promising research directions are then proposed based on the results of these experiments. The...
Cory McKay, Ichiro Fujinaga
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 7 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
« Prev « First page 1041 / 1092 Last » Next »