Sciweavers

846 search results - page 36 / 170
» On the Evolution of IMEDIA Implementations
Sort
View
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 4 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
DSVIS
2003
Springer
14 years 2 months ago
Workspaces: A Multi-level Architectural Style for Synchronous Groupware
We present a new architectural style for synchronous groupware that eases the transition from scenario based modeling to component design, and from component design to distributed ...
W. Greg Phillips, T. C. Nicholas Graham
TASE
2009
IEEE
14 years 4 months ago
Coarse Grained Retrenchment and the Mondex Denial of Service Attacks
Retrenchment is a framework that allows relatively unrestricted system evolution steps to be described in a way that gives an evolution step some formal content — unlike model b...
Richard Banach
ADBIS
2009
Springer
151views Database» more  ADBIS 2009»
14 years 4 months ago
Rule-Based Management of Schema Changes at ETL Sources
In this paper, we visit the problem of the management of inconsistencies emerging on ETL processes as results of evolution operations g at their sources. We abstract Extract-Transf...
George Papastefanatos, Panos Vassiliadis, Alkis Si...
SERA
2010
Springer
13 years 8 months ago
A UML Based Deployment and Management Modeling for Cooperative and Distributed Applications
Thanks to the major evolutions in the communication technologies and in order to deal with a continuous increase in systems complexity, current applications have to cooperate to ac...
Mohammed Nadhmi Miladi, Fatma Krichen, Mohamed Jma...