Sciweavers

758 search results - page 62 / 152
» Timing Analysis of Optimised Code
Sort
View
139
Voted
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 2 months ago
Towards Performance Measurement And Metrics Based Analysis of PLA Applications
This article is about a measurement analysis based approach to help software practitioners in managing the additional level complexities and variabilities in software product line...
Zeeshan Ahmed
137
Voted
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
15 years 1 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
153
Voted
CCS
2007
ACM
15 years 6 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
127
Voted
LCTRTS
1999
Springer
15 years 7 months ago
Live Memory Analysis for Garbage Collection in Embedded Systems
Real-time garbage collection is essential if object-oriented languages (in particular, Java) are to become predictable enough for real-time embedded systems. Although techniques f...
Patrik Persson
96
Voted
PPSN
2004
Springer
15 years 8 months ago
On the Importance of Information Speed in Structured Populations
A radius–based separation of selection and recombination spheres in diffusion model EAs is introduced, enabling a new taxonomy, oriented towards information flow analysis. It a...
Mike Preuss, Christian Lasarczyk