Sciweavers

3771 search results - page 531 / 755
» Subobject Transformation Systems
Sort
View
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
15 years 7 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
IPSN
2010
Springer
15 years 6 months ago
Information processing for live photo mosaic with a group of wireless image sensors
Photo tourism [11] is a platform that allows users to transform unstructured online digital photos into a 3D experience. Nowadays, image sensors are being extensively used to allo...
Fulu Li, James Barabas, Ana L. Santos
CDC
2008
IEEE
167views Control Systems» more  CDC 2008»
15 years 6 months ago
Convex formulations of aggregate network air traffic flow optimization problems
The problem of regulating air traffic in the en route airspace of the National Airspace System is studied using an Eulerian network model to describe air traffic flow. The evolutio...
Daniel B. Work, Alexandre M. Bayen
ASWC
2006
Springer
15 years 6 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
CSCW
2006
ACM
15 years 6 months ago
CVS integration with notification and chat: lightweight software team collaboration
Code management systems like Concurrent Version System (CVS) can play an important role in supporting coordination in software development, but often at some time removed from ori...
Geraldine Fitzpatrick, Paul Marshall, Anthony Phil...