Sciweavers

1963 search results - page 264 / 393
» How is aliasing used in systems software
Sort
View
EWSPT
1995
Springer
14 years 27 days ago
Experiments in Process Interface Descriptions, Visualizations and Analyses
A wide variety of techniques and approaches are needed to understand and improve software development processes. The critical research problem is supporting the move from completel...
David C. Carr, Ashok Dandekar, Dewayne E. Perry
ASPLOS
2011
ACM
13 years 28 days ago
Hybrid NOrec: a case study in the effectiveness of best effort hardware transactional memory
Transactional memory (TM) is a promising synchronization mechanism for the next generation of multicore processors. Best-effort Hardware Transactional Memory (HTM) designs, such a...
Luke Dalessandro, François Carouge, Sean Wh...
AFRICACRYPT
2009
Springer
14 years 4 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...
SIGUCCS
2003
ACM
14 years 2 months ago
Making online training and support easier for everyone with viewlets
Online training and support objects can be difficult and timeconsuming to create. Written words are often ignored by users who want someone to show them a procedure. Viewlets are ...
Janice Ward
BIS
2010
159views Business» more  BIS 2010»
13 years 4 months ago
Comparing Intended and Real Usage in Web Portal: Temporal Logic and Data Mining
Nowadays the software systems, including web portals, are developed from a priori assumptions about how the system will be used. However, frequently these assumptions hold only par...
Jérémy Besson, Ieva Mitasiunaite, Au...