Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Some mathematical objects can have more than one notation. When a system compiles mathematical material from multiple sources, a management effort to maintain uniform and appropri...
Shahid Manzoor, Paul Libbrecht, Carsten Ullrich, E...
Despite the increasing maturity of model-driven development (MDD), some research challenges remain open in the field of information systems (IS). For instance, there is a need to i...
One of the major bottlenecks in conceptual engineering design is the pure amount of design information which the design engineer needs to take into consideration. Furthermore, the ...
Web-based personal health records (PHRs) are under massive deployment. To improve PHR's capability and usability, we previously proposed the concept of intelligent PHR (iPHR)...