Sciweavers

1131 search results - page 164 / 227
» Performance analysis of BSTs in system software
Sort
View
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 3 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
CLEF
2009
Springer
13 years 10 months ago
Robust Question Answering for Speech Transcripts: UPC Experience in QAst 2009
This paper describes the participation of the Technical University of Catalonia in the CLEF 2009 Question Answering on Speech Transcripts track. We have participated in the Englis...
Pere Comas, Jordi Turmo
AFRICACRYPT
2009
Springer
14 years 3 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...
HICSS
2010
IEEE
182views Biometrics» more  HICSS 2010»
14 years 3 months ago
Analyzing Leadership Dynamics in Distributed Group Communication
—We apply social network analysis (SNA) to examine the dynamics of leadership in distributed groups, specifically Free/Libre Open Source Software development projects, and its r...
Kevin Crowston, Andrea Wiggins, James Howison
ATAL
2004
Springer
14 years 2 months ago
The EO-1 Autonomous Science Agent
— An Autonomous Science Agent is currently flying onboard the Earth Observing One Spacecraft. This software enables the spacecraft to autonomously detect and respond to science e...
Steve A. Chien, Rob Sherwood, Daniel Tran, Benjami...