Sciweavers

959 search results - page 136 / 192
» Towards flexible software processes by using process pattern...
Sort
View
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 7 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
147
Voted
AUIC
2006
IEEE
15 years 9 months ago
Implementing a natural user interface for camera phones using visual tags
Pointing is a natural way of communicating. Children in all cultures use pointing inherently. Attaching tags to our environment enables interaction by pointing. Visual tags are a g...
Sanni Siltanen, Jouko Hyväkkä
130
Voted
CSREAESA
2006
15 years 4 months ago
Reliable Management Services for COTS-based Space Systems and Applications
Hybrid spacecraft processing platforms that combine radiation-hardened components with commercialgrade COTS components have the potential to dramatically improve performance while ...
Ian A. Troxel, Eric Grobelny, Grzegorz Cieslewski,...
150
Voted
RTSS
2008
IEEE
15 years 10 months ago
A Multi-mode Real-Time Calculus
The Real-Time Calculus (RTC) framework proposed in [Chakraborty et al., DATE 2003] and subsequently extended in [Wandeler et al., Real-Time Systems 29(2-3), 2005] and a number of ...
Linh T. X. Phan, Samarjit Chakraborty, P. S. Thiag...
145
Voted
RE
1999
Springer
15 years 7 months ago
Bridging the Gap Between Past and Future in RE: A Scenario-Based Approach
Requirements Engineering (RE) investigates the impact of a future-oriented change vision, but the move towards this vision must consider a context heavily shaped by the past. As R...
Peter Haumer, Matthias Jarke, Klaus Pohl, Patrick ...