Sciweavers

2018 search results - page 176 / 404
» On Conceptualization as a Systematic Process
Sort
View
ICEIS
2007
IEEE
15 years 10 months ago
Opting for Innovation in Mobile Applications
In this paper we are concerned with innovation in the development of mobile applications. In particular, we address how we may come to think systematically about innovative aspects...
Jens Henrik Hosbond, Peter Axel Nielsen, Ivan Aaen
INFOCOM
2007
IEEE
15 years 10 months ago
Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today?
— Protecting BGP routing from errors and malice is one of the next big challenges for Internet routing. Several approaches have been proposed that attempt to capture and block ro...
Georgos Siganos, Michalis Faloutsos
ACMSE
2006
ACM
15 years 10 months ago
Framework design using function generalization: a binary tree traversal case study
A software framework is a technology that enables software reuse, potentially yielding rich dividends but requiring significant longterm investment. However, a framework is not a ...
H. Conrad Cunningham, Yi Liu, Pallavi Tadepalli
ISLPED
2005
ACM
101views Hardware» more  ISLPED 2005»
15 years 9 months ago
Defocus-aware leakage estimation and control
Leakage power is one of the most critical issues for ultra-deep submicron technology. Subthreshold leakage depends exponentially on linewidth, and consequently variation in linewi...
Andrew B. Kahng, Swamy Muddu, Puneet Sharma
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 9 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore