Sciweavers

3330 search results - page 550 / 666
» software 2010
Sort
View
ASM
2010
ASM
15 years 7 months ago
Starting B Specifications from Use Cases
The B method is one of the most used formal methods, when reactive systems is under question, due to good support for refinement. However, obtaining the formal model from requireme...
Thiago C. de Sousa, Aryldo G. Russo
CCS
2010
ACM
15 years 7 months ago
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
Cloud computing has emerged as a multi-tenant resource sharing platform, which allows different service providers to deliver software as services in an economical way. However, fo...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
15 years 7 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
DAC
2010
ACM
15 years 7 months ago
On the costs and benefits of stochasticity in stream processing
With the end of clock-frequency scaling, parallelism has emerged as the key driver of chip-performance growth. Yet, several factors undermine efficient simultaneous use of onchip ...
Raj R. Nadakuditi, Igor L. Markov
ECMDAFA
2010
Springer
151views Hardware» more  ECMDAFA 2010»
15 years 7 months ago
Generative Technologies for Model Animation in the TopCased Platform
Domain Specific Modeling Languages (DSML) are more and more used to handle high level concepts, and thus bring complex software development under control. The increasingly recurrin...
Xavier Crégut, Benoît Combemale, Marc...