Sciweavers

734 search results - page 87 / 147
» A Method for Teaching a Software Process based on the Person...
Sort
View
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
14 years 15 days ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
JOC
2010
92views more  JOC 2010»
13 years 3 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
PAMI
2012
11 years 11 months ago
Active Visual Segmentation
—Attention is an integral part of the human visual system and has been widely studied in the visual attention literature. The human eyes fixate at important locations in the scen...
Ajay K. Mishra, Yiannis Aloimonos, Loong Fah Cheon...
WIRTSCHAFTSINFORMATI
2007
13 years 10 months ago
Management of Portal Evolution
Software evolution is an essential concept underlying the engineering of corporate portals. Due to the complexity of such systems, it requires great effort and is not advisable to...
Hong Tuan Kiet Vo, Helmuth Elsner
CIKM
2008
Springer
13 years 10 months ago
Efficient sampling of information in social networks
As online social networking emerges, there has been increased interest to utilize the underlying social structure as well as the available social information to improve search. In...
Gautam Das, Nick Koudas, Manos Papagelis, Sushruth...