Sciweavers

2086 search results - page 90 / 418
» Principles of Software Evolution
Sort
View
JDCTA
2010
175views more  JDCTA 2010»
13 years 4 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
ECMDAFA
2008
Springer
91views Hardware» more  ECMDAFA 2008»
13 years 11 months ago
Generic Reusable Concern Compositions
The increasing complexity of software applications requires improved software development techniques in order to cope with, a.o., software reuse and evolution, the management of he...
Aram Hovsepyan, Stefan Van Baelen, Yolande Berbers...
ACSAC
2008
IEEE
14 years 4 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
OOPSLA
2001
Springer
14 years 2 months ago
Multitasking without Compromise: A Virtual Machine Evolution
The Multitasking Virtual Machine (called from now on simply MVM) is a modification of the Java™ virtual machine. It enables safe, secure, and scalable multitasking. Safety is ac...
Grzegorz Czajkowski, Laurent Daynès
COGSCI
2007
99views more  COGSCI 2007»
13 years 10 months ago
Language Evolution by Iterated Learning With Bayesian Agents
Languages are transmitted from person to person and generation to generation via a process of iterated learning: people learn a language from other people who once learned that la...
Thomas L. Griffiths, Michael L. Kalish