Sciweavers

5457 search results - page 67 / 1092
» Software Component Independence
Sort
View
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 9 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
TSP
2010
14 years 9 months ago
ALOHA with collision resolution (ALOHA-CR): theory and software defined radio implementation
A cross-layer scheme, namely ALOHA With Collision Resolution (ALOHA-CR), is proposed for high throughput wireless communications in a cellular scenario. Transmission occurs in a t...
Xin Liu, John Kountouriotis, Athina P. Petropulu, ...
FLAIRS
1998
15 years 4 months ago
The Use of Function and Component Hierarchies to Generate User Information
This paper describes a technique which allows impaired functions to be automatically determined from the faulty components and vice versa. Moreover a knowledge base containing the...
Andreas Heinzelmann
ICSE
2003
IEEE-ACM
16 years 3 months ago
A Compositional Formalization of Connector Wrappers
Increasingly systems are composed of parts: software components, and the interaction mechanisms (connectors) that enable them to communicate. When assembling systems from independ...
Bridget Spitznagel, David Garlan
ICSE
2003
IEEE-ACM
16 years 3 months ago
The Vienna Component Framework Enabling Composition Across Component Models
The Vienna Component Framework (VCF) supports the interoperability and composability of components across different component models, a facility that is lacking in existing compon...
Johann Oberleitner, Thomas Gschwind, Mehdi Jazayer...