Sciweavers

15474 search results - page 2871 / 3095
» Emergent process design
Sort
View
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 3 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
IWIC
2007
Springer
14 years 3 months ago
Collaborative Platform for Multilingual Resource Development and Intercultural Communication
The Internet has already connected people and established a mature online community. The use of WWW is also in the main stream of disseminating one’s information and services. In...
Virach Sornlertlamvanich, Thatsanee Charoenporn, K...
PPAM
2007
Springer
14 years 3 months ago
Enhancing Productivity in High Performance Computing through Systematic Conditioning
Abstract. In order to take full advantage of high-end computing platforms, scientific applications often require modifications to source codes, and to their build systems that ge...
Magdalena Slawiñska, Jaroslaw Slawinski, Va...
SEMWEB
2007
Springer
14 years 3 months ago
Cultural Adaptivity for the Semantic Web
Our research explores the possibilities for factoring culture into user models, working towards cultural adaptivity in the semantic web. The aim is to represent the user’s positi...
Katharina Reinecke
ACSC
2006
IEEE
14 years 3 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
« Prev « First page 2871 / 3095 Last » Next »