Sciweavers

4101 search results - page 664 / 821
» Differential Power Analysis
Sort
View
IPPS
2009
IEEE
14 years 4 months ago
Combating side-channel attacks using key management
Embedded devices are widely used in military and civilian operations. They are often unattended, publicly accessible, and thus vulnerable to physical capture. Tamper-resistant mod...
Donggang Liu, Qi Dong
ICPR
2010
IEEE
14 years 4 months ago
Canonical Patterns of Oriented Topologies
—A common problem in many areas of behavioral research is the analysis of the large volume of data recorded during the execution of the tasks being studied. Recent work has propo...
Walter Mankowski, Ali Shokoufandeh, Dario Salvucci
BPM
2009
Springer
134views Business» more  BPM 2009»
14 years 4 months ago
Business Process-Based Resource Importance Determination
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Stefan Fenz, Andreas Ekelhart, Thomas Neubauer
WABI
2009
Springer
162views Bioinformatics» more  WABI 2009»
14 years 4 months ago
Aligning Biomolecular Networks Using Modular Graph Kernels
Comparative analysis of biomolecular networks constructed using measurements from different conditions, tissues, and organisms offer a powerful approach to understanding the stru...
Fadi Towfic, M. Heather West Greenlee, Vasant Hona...
ATAL
2009
Springer
14 years 4 months ago
Aerogility: an intelligent decision support system for managing service-based aftermarkets
This paper describes Aerogility - an intelligent decision support system for managing service-based aftermarkets. Aerogility uses multi-agent software technology to implement a dy...
Viet Dung Dang, Steve Osborn, Gary Vickers, Malcol...