Sciweavers

11376 search results - page 2192 / 2276
» Willow System Demonstration
Sort
View
VMCAI
2004
Springer
15 years 6 months ago
Construction of a Semantic Model for a Typed Assembly Language
Typed Assembly Languages (TALs) can be used to validate the safety of assembly-language programs. However, typing rules are usually trusted as axioms. In this paper, we show how to...
Gang Tan, Andrew W. Appel, Kedar N. Swadi, Dinghao...
CCGRID
2003
IEEE
15 years 6 months ago
Scheduling Distributed Applications: the SimGrid Simulation Framework
— Since the advent of distributed computer systems an active field of research has been the investigation of scheduling strategies for parallel applications. The common approach...
Arnaud Legrand, Loris Marchal, Henri Casanova
93
Voted
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
15 years 6 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
106
Voted
DSN
2003
IEEE
15 years 6 months ago
Dependability Enhancement for IEEE 802.11 Wireless LAN with Redundancy Techniques
The presence of physical obstacles and radio interference results in the so called “shadow regions” in wireless networks. When a mobile station roams into a shadow region, it ...
Dongyan Chen, Sachin Garg, Chandra M. R. Kintala, ...
84
Voted
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
15 years 6 months ago
Trust, Trait Theory, and Collaboration in Telemedicine: A Circumplex Perspective
More than a process-automating tool, telemedicine is increasingly recognized for its ability to facilitate collaboration and knowledge creation between disparate healthcare provid...
Houghton G. Brown, Marshall Scott Poole, Thomas Le...
« Prev « First page 2192 / 2276 Last » Next »