Sciweavers

153 search results - page 4 / 31
» Performance analysis of different checkpointing and recovery...
Sort
View
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
13 years 11 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
MEMOCODE
2006
IEEE
14 years 1 months ago
A scenario-aware data flow model for combined long-run average and worst-case performance analysis
Data flow models are used for specifying and analysing signal processing and streaming applications. However, traditional data flow models are either not capable of expressing t...
Bart D. Theelen, Marc Geilen, Twan Basten, Jeroen ...
ISCC
2002
IEEE
101views Communications» more  ISCC 2002»
14 years 16 days ago
Partial path protection for WDM networks: end-to-end recovery using local failure information
In this paper, we propose a new protection scheme, which we term partial path protection (PPP), to select endto-end backup paths using local information about network failures. PP...
Hungjen Wang, Eytan Modiano, Muriel Médard
WOSP
2005
ACM
14 years 1 months ago
Performance by unified model analysis (PUMA)
Evaluation of non-functional properties of a design (such as performance, dependability, security, etc.) can be enabled by design annotations specific to the property to be evalua...
C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan...
CAIP
2003
Springer
248views Image Analysis» more  CAIP 2003»
14 years 26 days ago
Shape from Photometric Stereo and Contours
In this work, we further discuss an approach to 3D shape recovery by combining photometric stereo and shape from contours methods. Surfaces recovered by photometric stereo are ali...
Chia-Yen Chen, Reinhard Klette, Chi-Fa Chen