Sciweavers

23119 search results - page 4618 / 4624
» From Domain to Requirements
Sort
View
ISCA
2012
IEEE
212views Hardware» more  ISCA 2012»
11 years 9 months ago
TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on ...
Robert Martin, John Demme, Simha Sethumadhavan
TVCG
2012
195views Hardware» more  TVCG 2012»
11 years 9 months ago
Hierarchical Streamline Bundles
—Effective three-dimensional streamline placement and visualization plays an essential role in many science and engineering disciplines. The main challenge for effective streamli...
Hongfeng Yu, Chaoli Wang, Ching-Kuang Shene, Jacqu...
SIGMETRICS
2012
ACM
253views Hardware» more  SIGMETRICS 2012»
11 years 9 months ago
Characterizing continuous time random walks on time varying graphs
In this paper we study the behavior of a continuous time random walk (CTRW) on a stationary and ergodic time varying dynamic graph. We establish conditions under which the CTRW is...
Daniel R. Figueiredo, Philippe Nain, Bruno F. Ribe...
TSE
2012
11 years 9 months ago
Does Software Process Improvement Reduce the Severity of Defects? A Longitudinal Field Study
— As firms increasingly rely on information systems to perform critical functions the consequences of software defects can be catastrophic. Although the software engineering lite...
Donald E. Harter, Chris F. Kemerer, Sandra Slaught...
PKC
2012
Springer
234views Cryptology» more  PKC 2012»
11 years 9 months ago
Ring-LWE in Polynomial Rings
Abstract. The Ring-LWE problem, introduced by Lyubashevsky, Peikert, and Regev (Eurocrypt 2010), has been steadily finding many uses in numerous cryptographic applications. Still,...
Léo Ducas, Alain Durmus
« Prev « First page 4618 / 4624 Last » Next »