Sciweavers

3104 search results - page 9 / 621
» Competence-Based EE-Learning: (How) Can We Implement It
Sort
View
WISA
2010
Springer
15 years 1 months ago
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an imp...
Jean-François Gallais, Ilya Kizhvatov, Mich...
ESWS
2004
Springer
15 years 7 months ago
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. T...
Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla,...
JSS
2010
120views more  JSS 2010»
14 years 11 months ago
Handling communications in process algebraic architectural description languages: Modeling, verification, and implementation
Architectural description languages are a useful tool for modeling complex systems at a high level of abstraction. If based on formal methods, they can also serve for enabling the...
Marco Bernardo, Edoardo Bontà, Alessandro A...
DAGSTUHL
2003
15 years 5 months ago
How Should Control and Body Systems Be Coupled? A Robotic Case Study
Abstract. This study is intended to deal with the interdependency between control and body systems, and to discuss the “relationship as it should be” between these two systems....
Akio Ishiguro, Toshihiro Kawakatsu
FI
2010
143views more  FI 2010»
14 years 11 months ago
Implementing Value Added Applications in Next Generation Networks
: One of the major issues in the future Internet is the integration of telecom networks with the Internet. In many countries, large Internet Service Providers (ISPs) are also telec...
Yeh-Chin Ho, Yi-Bing Lin, Ren-Huang Liou, Yuan-Kua...