Sciweavers

1081 search results - page 189 / 217
» Challenges: an application model for pervasive computing
Sort
View
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 7 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
120
Voted
ICIP
1995
IEEE
15 years 7 months ago
A harmonic retrieval framework for discontinuous motion estimation
Abstract— Motion discontinuities arise when there are occlusions or multiple moving objects in the scene that is imaged. Conventional regularization techniques use smoothness con...
Wei-Ge Chen, Georgios B. Giannakis, N. Nandhakumar
EDBT
2008
ACM
160views Database» more  EDBT 2008»
15 years 5 months ago
Taxonomy-superimposed graph mining
New graph structures where node labels are members of hierarchically organized ontologies or taxonomies have become commonplace in different domains, e.g., life sciences. It is a ...
Ali Cakmak, Gultekin Özsoyoglu
SIMUTOOLS
2008
15 years 5 months ago
An overview of the OMNeT++ simulation environment
The OMNeT++ discrete event simulation environment has been publicly available since 1997. It has been created with the simulation of communication networks, multiprocessors and ot...
András Varga, Rudolf Hornig
177
Voted
SEC
2007
15 years 5 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul