Sciweavers

604 search results - page 78 / 121
» Advances in design and implementation of optimization softwa...
Sort
View
DAC
2007
ACM
14 years 7 hour ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
CC
2003
Springer
102views System Software» more  CC 2003»
14 years 1 months ago
Precision in Practice: A Type-Preserving Java Compiler
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
Christopher League, Zhong Shao, Valery Trifonov
CDC
2009
IEEE
129views Control Systems» more  CDC 2009»
14 years 2 days ago
Improving the performance of active set based Model Predictive Controls by dataflow methods
Abstract-- Dataflow representations of Digital Signal Processing (DSP) software have been developing since the 1980's. They have proven to be useful in identifying bottlenecks...
Ruirui Gu, Shuvra S. Bhattacharyya, William S. Lev...
JSA
2002
125views more  JSA 2002»
13 years 7 months ago
Building a dependable system from a legacy application with CORBA
This paper presents a dependability oriented, fault tolerance based system design, development, and deployment approach. The approach relies on an architectural framework, which a...
Domenico Cotroneo, Nicola Mazzocca, Luigi Romano, ...
IUI
2011
ACM
12 years 11 months ago
Protractor3D: a closed-form solution to rotation-invariant 3D gestures
Protractor 3D is a gesture recognizer that extends the 2D touch screen gesture recognizer Protractor [8] to 3D gestures. It inherits many of Protractor’s desirable properties, s...
Sven G. Kratz, Michael Rohs