Sciweavers

4759 search results - page 871 / 952
» Software Development Based on Software Pattern Evolution
Sort
View
RECONFIG
2009
IEEE
118views VLSI» more  RECONFIG 2009»
15 years 9 months ago
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Abstract. Protecting an implementation against Side Channel Analysis for Reverse Engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a fir...
Julien Bringer, Hervé Chabanne, Jean-Luc Da...
ECMDAFA
2009
Springer
170views Hardware» more  ECMDAFA 2009»
15 years 9 months ago
A Model Driven Approach to the Analysis of Timeliness Properties
The need for a design language that is rigorous but accessible and intuitive is often at odds with the formal and mathematical nature of languages used for analysis. UML and Petri ...
Mohamed Ariff Ameedeen, Behzad Bordbar, Rachid Ana...
EPEW
2009
Springer
15 years 9 months ago
Performance of Auctions and Sealed Bids
We develop models of automated E-commerce techniques, which predict the economic outcomes of these decision mechanisms, including the price attained by a good and the resulting inc...
Erol Gelenbe, László Györfi
112
Voted
VRST
2009
ACM
15 years 9 months ago
Wearable imaging system for capturing omnidirectional movies from a first-person perspective
We propose a novel wearable imaging system that can capture omnidirectional movies from the viewpoint of the camera wearer. The imaging system solves the problems of resolution un...
Kazuaki Kondo, Yasuhiro Mukaigawa, Yasushi Yagi
186
Voted
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 9 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...