Sciweavers

5668 search results - page 1017 / 1134
» The case for software evolution
Sort
View
CCS
2008
ACM
15 years 7 hour ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
15 years 4 hour ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...
CIKM
2008
Springer
15 years 1 hour ago
Purpose tagging: capturing user intent to assist goal-oriented social search
The terms that are used by users during tagging have been found to be different from the terms that are used when searching for resources, which represents a fundamental problem f...
Markus Strohmaier
CF
2005
ACM
14 years 12 months ago
Reversible logic for supercomputing
This paper is about making reversible logic a reality for supercomputing. Reversible logic offers a way to exceed certain basic limits on the performance of computers, yet a power...
Erik DeBenedictis
DLS
2005
122views Languages» more  DLS 2005»
14 years 12 months ago
Language constructs for context-oriented programming: an overview of ContextL
ContextL is an extension to the Common Lisp Object System that allows for Context-oriented Programming. It provides means to associate partial class and method definitions with l...
Pascal Costanza, Robert Hirschfeld
« Prev « First page 1017 / 1134 Last » Next »