Sciweavers

2211 search results - page 277 / 443
» Comparing Approaches to Implement Feature Model Composition
Sort
View
SAC
2000
ACM
14 years 1 months ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi
VLDB
2007
ACM
155views Database» more  VLDB 2007»
14 years 9 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
CHES
2009
Springer
157views Cryptology» more  CHES 2009»
14 years 9 months ago
Differential Cluster Analysis
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Ru...
ASPDAC
2005
ACM
86views Hardware» more  ASPDAC 2005»
14 years 2 months ago
Thermal-driven multilevel routing for 3-D ICs
3-D IC has a great potential for improving circuit performance and degree of integration. It is also an attractive platform for system-on-chip or system-in-package solutions. A cr...
Jason Cong, Yan Zhang
PATMOS
2004
Springer
14 years 2 months ago
Sleepy Stack Reduction of Leakage Power
Leakage power consumption of current CMOS technology is already a great challenge. ITRS projects that leakage power consumption may come to dominate total chip power consumption as...
Jun-Cheol Park, Vincent John Mooney III, Philipp P...