Sciweavers

1585 search results - page 173 / 317
» Data Quality Requirements Analysis and Modeling
Sort
View
ITCC
2005
IEEE
15 years 10 months ago
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Abstract— Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
François-Xavier Standaert, Eric Peeters, Je...
COMCOM
2000
126views more  COMCOM 2000»
15 years 4 months ago
Charging for packet-switched network communication - motivation and overview
Packet-switched network technology is expected to form the integration layer for future multi-service networks. The trend to integrate voice and data traffic can already be observe...
Martin Karsten, Jens Schmitt, Burkhard Stiller, La...
FM
2001
Springer
108views Formal Methods» more  FM 2001»
15 years 9 months ago
Improvements in BDD-Based Reachability Analysis of Timed Automata
To develop efficient algorithms for the reachability analysis of timed automata, a promising approach is to use binary decision diagrams (BDDs) as data structure for the representa...
Dirk Beyer
CN
2006
83views more  CN 2006»
15 years 4 months ago
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
This paper presents an assessment of the communication overheads of IPsec and evaluates the feasibility of deploying it on handheld devices for the UMTS architecture. A wide range...
Christos Xenakis, Nikolaos Laoutaris, Lazaros F. M...
HIPEAC
2010
Springer
16 years 1 months ago
Combining Locality Analysis with Online Proactive Job Co-scheduling in Chip Multiprocessors
Abstract. The shared-cache contention on Chip Multiprocessors causes performance degradation to applications and hurts system fairness. Many previously proposed solutions schedule ...
Yunlian Jiang, Kai Tian, Xipeng Shen