Sciweavers

11022 search results - page 2165 / 2205
» Programming Systems for Autonomy
Sort
View
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
14 years 1 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
14 years 1 months ago
Modeling Web Applications Using Java and XML Related Technologies
The purpose of this paper is to propose visual models for a web application using Java and XML related technologies. We consider a web application that uses 3tier architecture and...
Sam Chung, Yun Sik Lee
HPDC
2003
IEEE
14 years 1 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
ICIP
2003
IEEE
14 years 1 months ago
Inter-camera color calibration by correlation model function
We present a novel solution to the inter-camera color calibration problem, which is very important for multi-camera systems. We propose a distance metric and a model function to e...
Fatih Murat Porikli
PPOPP
2003
ACM
14 years 1 months ago
Optimizing data aggregation for cluster-based internet services
Large-scale cluster-based Internet services often host partitioned datasets to provide incremental scalability. The aggregation of results produced from multiple partitions is a f...
Lingkun Chu, Hong Tang, Tao Yang, Kai Shen
« Prev « First page 2165 / 2205 Last » Next »