Sciweavers

727 search results - page 93 / 146
» Making Distortions Comprehensible
Sort
View
CHES
2000
Springer
111views Cryptology» more  CHES 2000»
14 years 4 days ago
How to Explain Side-Channel Leakage to Your Kids
This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three diļ¬...
David Naccache, Michael Tunstall
WETICE
1998
IEEE
14 years 1 days ago
Workgroup Middleware for Distributed Projects*
We have developed a middleware framework for workgroup environments that can support distributed software development and a variety of other application domains requiring document...
Gail E. Kaiser, Stephen E. Dossick
ICSM
1997
IEEE
14 years 16 hour ago
Dynamic Traceability Links Supported by a System Architecture Description
To reduce the effort spent on system comprehension during software maintenance, easy access to different type of information describing the system features is necessary. This is u...
Eirik Tryggeseth, Øystein Nytrø
DAC
1997
ACM
14 years 4 hour ago
Analysis and Evaluation of Address Arithmetic Capabilities in Custom DSP Architectures
ā€”Many application-speciļ¬c architectures provide indirect addressing modes with auto-increment/decrement arithmetic. Since these architectures generally do not feature an indexe...
Ashok Sudarsanam, Stan Y. Liao, Srinivas Devadas
MOBICOM
1997
ACM
14 years 2 hour ago
Composable ad-hoc Mobile Services for Universal Interaction
This paperintroduces the notion of ā€œuniversalinteraction,ā€ allowing a device to adapt its functionality to exploit services it discovers as it moves into a new environment. Us...
Todd D. Hodes, Randy H. Katz, Edouard Servan-Schre...