Sciweavers

2747 search results - page 419 / 550
» Network externalities in software systems
Sort
View
JOC
2010
92views more  JOC 2010»
13 years 3 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 3 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
ICWS
2009
IEEE
14 years 6 months ago
SOA-Based Integration of the Internet of Things in Enterprise Services
Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply ...
Patrik Spiess, Stamatis Karnouskos, Dominique Guin...
SIGSOFT
2005
ACM
14 years 9 months ago
Information hiding interfaces for aspect-oriented design
The growing popularity of aspect-oriented languages, such as AspectJ, and of corresponding design approaches, makes it important to learn how best to modularize programs in which ...
Kevin J. Sullivan, William G. Griswold, Yuanyuan S...
LCTRTS
2004
Springer
14 years 2 months ago
Advanced control flow in Java card programming
Java Card technology simplifies the development of smart card applications by providing a high-level programming language similar to Java. However, the master-slave programming m...
Peng Li, Steve Zdancewic