Sciweavers

3316 search results - page 614 / 664
» Mining Software Engineering Data
Sort
View
AFRICACRYPT
2010
Springer
14 years 2 months ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley
EUROSYS
2007
ACM
14 years 8 months ago
Adaptive control of virtualized resources in utility computing environments
Data centers are often under-utilized due to over-provisioning as well as time-varying resource demands of typical enterprise applications. One approach to increase resource utili...
Pradeep Padala, Kang G. Shin, Xiaoyun Zhu, Mustafa...
ICDE
1999
IEEE
143views Database» more  ICDE 1999»
15 years 15 days ago
Query Routing in Large-Scale Digital Library Systems
Modern digital libraries require user-friendly and yet responsive access to the rapidly growing, heterogeneous, and distributed collection of information sources. However, the inc...
Ling Liu
DAC
2005
ACM
15 years 3 days ago
Simulation based deadlock analysis for system level designs
In the design of highly complex, heterogeneous, and concurrent systems, deadlock detection and resolution remains an important issue. In this paper, we systematically analyze the ...
Xi Chen, Abhijit Davare, Harry Hsieh, Alberto L. S...
WWW
2008
ACM
14 years 12 months ago
Using context to enable semantic mediation in web service communities
The use of communities provides a scalable solution for gathering and managing functionally-equivalent Web services. In order to ensure single access to the community, a community...
Michael Mrissa, Philippe Thiran, Chirine Ghedira, ...