Sciweavers

1282 search results - page 159 / 257
» Practical Loss-Resilient Codes
Sort
View
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
14 years 1 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
ICSOFT
2008
13 years 11 months ago
Aria Language - Towards Agent Orientation Paradigm
As building large-scale software systems is complex, several software engineering paradigms have been devised. Agent oriented paradigm is one of the most predominant contributions...
Mohsen Lesani, Niloufar Montazeri
INTERFACES
2008
77views more  INTERFACES 2008»
13 years 10 months ago
Showcase Scheduling at Fred Astaire East Side Dance Studio
: The ballroom dancing showcases at Fred Astaire East Side Dance Studio in Manhattan are held at least twice a year and provide the students with an environment for socializing, pr...
Miguel A. Lejeune, Nevena Yakova

Publication
351views
15 years 10 months ago
Synthesizable High Level Hardware Descriptions
Modern hardware description languages support code-generation constructs like generate/endgenerate in Verilog. These constructs are intended to describe regular or parameterized ha...
Jennifer Gillenwater, Gregory Malecha, Cherif Sala...
SIGSOFT
2007
ACM
14 years 10 months ago
Training on errors experiment to detect fault-prone software modules by spam filter
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
Osamu Mizuno, Tohru Kikuno