Sciweavers

14190 search results - page 2618 / 2838
» computing 2008
Sort
View
143
Voted
EIT
2008
IEEE
15 years 5 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
85
Voted
EKAW
2008
Springer
15 years 5 months ago
E-Business Vocabularies as a Moving Target: Quantifying the Conceptual Dynamics in Domains
Most practically relevant domains include some degree of conceptual dynamics, i.e. new conceptual elements arise, and some old ones become irrelevant. This type of change imposes a...
Martin Hepp
158
Voted
EMS
2008
IEEE
15 years 5 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
149
Voted
EMSOFT
2008
Springer
15 years 5 months ago
RTComposer: a framework for real-time components with scheduling interfaces
We present a framework for component-based design and scheduling of real-time embedded software. Each component has a clearly specified interface that includes the methods used fo...
Rajeev Alur, Gera Weiss
145
Voted
EMSOFT
2008
Springer
15 years 5 months ago
Wireless channel access reservation for embedded real-time systems
Reservation-based channel access has been shown to be effective in providing Quality of Service (QoS) guarantees (e.g., timeliness) in wireless embedded real-time applications suc...
Dinesh Rajan, Christian Poellabauer, Xiaobo Sharon...
« Prev « First page 2618 / 2838 Last » Next »