Sciweavers

1352 search results - page 101 / 271
» Designing Security Requirements Models Through Planning
Sort
View
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
14 years 4 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 10 months ago
Simultaneous scalability and security for data-intensive web applications
For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches appli...
Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, ...
HAPTICS
2007
IEEE
14 years 4 months ago
The Effect of Virtual Haptic Training on Real Surgical Drilling Proficiency
This sketch presents the design and preliminary results of a study that investigates the transference of motor skills learned in a haptic-enabled virtual environment to performanc...
Christopher Sewell, Nikolas H. Blevins, Sumanth Pe...
OOPSLA
2007
Springer
14 years 4 months ago
CASE-FX: feature modeling support in an OO Case tool
Generative Programming advocates developing a family of systems rather than a set of single systems. Feature modeling can assist in supporting the development of such software pro...
Alain Forget, Dave Arnold, Sonia Chiasson
CORR
2007
Springer
154views Education» more  CORR 2007»
13 years 10 months ago
Application of a design space exploration tool to enhance interleaver generation
This paper presents a methodology to efficiently explore the design space of communication adapters. In most digital signal processing (DSP) applications, the overall performance ...
Cyrille Chavet, Philippe Coussy, Pascal Urard, Eri...