Sciweavers

5457 search results - page 67 / 1092
» Software Component Independence
Sort
View
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 6 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
128
Voted
TSP
2010
14 years 7 months ago
ALOHA with collision resolution (ALOHA-CR): theory and software defined radio implementation
A cross-layer scheme, namely ALOHA With Collision Resolution (ALOHA-CR), is proposed for high throughput wireless communications in a cellular scenario. Transmission occurs in a t...
Xin Liu, John Kountouriotis, Athina P. Petropulu, ...
84
Voted
FLAIRS
1998
15 years 1 months ago
The Use of Function and Component Hierarchies to Generate User Information
This paper describes a technique which allows impaired functions to be automatically determined from the faulty components and vice versa. Moreover a knowledge base containing the...
Andreas Heinzelmann
ICSE
2003
IEEE-ACM
16 years 20 days ago
A Compositional Formalization of Connector Wrappers
Increasingly systems are composed of parts: software components, and the interaction mechanisms (connectors) that enable them to communicate. When assembling systems from independ...
Bridget Spitznagel, David Garlan
ICSE
2003
IEEE-ACM
16 years 20 days ago
The Vienna Component Framework Enabling Composition Across Component Models
The Vienna Component Framework (VCF) supports the interoperability and composability of components across different component models, a facility that is lacking in existing compon...
Johann Oberleitner, Thomas Gschwind, Mehdi Jazayer...