Sciweavers

2482 search results - page 397 / 497
» Characterizing Programming Systems Allowing Program Self-ref...
Sort
View
CASES
2009
ACM
14 years 26 days ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...
ISCA
1998
IEEE
123views Hardware» more  ISCA 1998»
14 years 13 days ago
Weak Ordering - A New Definition
A memory model for a shared memory, multiprocessor commonly and often implicitly assumed by programmers is that of sequential consistency. This model guarantees that all memory ac...
Sarita V. Adve, Mark D. Hill
ASAP
1997
IEEE
156views Hardware» more  ASAP 1997»
14 years 12 days ago
Design methodology for digital signal processing
Improvements in semiconductor integration density and the resulting problem of having to manage designs of increasing complexity is an old one, but still current. The new challeng...
Gerhard Fettweis
ICSE
1998
IEEE-ACM
14 years 12 days ago
Extracting Concepts from File Names: A New File Clustering Criterion
Decomposing complex software systems into conceptually independent subsystems is a significant software engineering activity which received considerable research attention. Most o...
Nicolas Anquetil, Timothy Lethbridge
IEAAIE
1998
Springer
14 years 12 days ago
Managing the Usage Experience in a Library of Software Components
The users of libraries of object-oriented software components face with both a terminological and a cognitive gap. Usually, library users do not understand the vocabulary used in t...
Pedro A. González-Calero, Mercedes Gó...