Sciweavers

1708 search results - page 119 / 342
» A methodology to design information retrieval systems (MDIRS...
Sort
View
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 5 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
ICML
2010
IEEE
13 years 12 months ago
Detecting Large-Scale System Problems by Mining Console Logs
Surprisingly, console logs rarely help operators detect problems in large-scale datacenter services, for they often consist of the voluminous intermixing of messages from many sof...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
DAC
2009
ACM
14 years 11 months ago
Evaluating design trade-offs in customizable processors
The short time-to-market window for embedded systems demands automation of design methodologies for customizable processors. Recent research advances in this direction have mostly...
Unmesh D. Bordoloi, Huynh Phung Huynh, Samarjit Ch...
SEKE
2005
Springer
14 years 4 months ago
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution
Most design recovery approaches start from analysing source code. Nonetheless, it is very difficult to get adequate design information only depending on source code. Additional av...
Shaoyun Li, Feng Chen, Zhihong Liang, Hongji Yang
IRI
2003
IEEE
14 years 4 months ago
A Formal Framework for Design Component Contracts
– Building large software systems out of existing software components can save time and cost. These software components range from architectural and design components to binary c...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan