Sciweavers

7112 search results - page 1231 / 1423
» Power in normative systems
Sort
View
DAMON
2008
Springer
13 years 11 months ago
Fast scans and joins using flash drives
As access times to main memory and disks continue to diverge, faster non-volatile storage technologies become more attractive for speeding up data analysis applications. NAND flas...
Mehul A. Shah, Stavros Harizopoulos, Janet L. Wien...
DCAI
2008
13 years 11 months ago
The Intelligent Butler: A Virtual Agent for Disabled and Elderly People Assistance
Abstract. Social assistance constitutes an increasing problem in developed countries, which can be considered from two dimensions: the home and the hospital frameworks. Anyway, mos...
Gabriel Fiol-Roig, Diana Arellano, Francisco J. Pe...
ECOOP
2008
Springer
13 years 11 months ago
Liquid Metal: Object-Oriented Programming Across the Hardware/Software Boundary
Abstract. The paradigm shift in processor design from monolithic processors to multicore has renewed interest in programming models that facilitate parallelism. While multicores ar...
Shan Shan Huang, Amir Hormati, David F. Bacon, Rod...
EDCC
2008
Springer
13 years 11 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
EMSOFT
2008
Springer
13 years 11 months ago
Interface theories with component reuse
Interface theories have been proposed to support incremental design and independent implementability. Incremental design means that the compatibility checking of interfaces can pr...
Laurent Doyen, Thomas A. Henzinger, Barbara Jobstm...
« Prev « First page 1231 / 1423 Last » Next »