Sciweavers

11022 search results - page 2165 / 2205
» Programming Systems for Autonomy
Sort
View
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
15 years 7 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
112
Voted
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
15 years 7 months ago
Modeling Web Applications Using Java and XML Related Technologies
The purpose of this paper is to propose visual models for a web application using Java and XML related technologies. We consider a web application that uses 3tier architecture and...
Sam Chung, Yun Sik Lee
HPDC
2003
IEEE
15 years 7 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
109
Voted
ICIP
2003
IEEE
15 years 7 months ago
Inter-camera color calibration by correlation model function
We present a novel solution to the inter-camera color calibration problem, which is very important for multi-camera systems. We propose a distance metric and a model function to e...
Fatih Murat Porikli
PPOPP
2003
ACM
15 years 7 months ago
Optimizing data aggregation for cluster-based internet services
Large-scale cluster-based Internet services often host partitioned datasets to provide incremental scalability. The aggregation of results produced from multiple partitions is a f...
Lingkun Chu, Hong Tang, Tao Yang, Kai Shen
« Prev « First page 2165 / 2205 Last » Next »