Sciweavers

8503 search results - page 1575 / 1701
» Secure Software Architectures
Sort
View
EDOC
2008
IEEE
13 years 10 months ago
A Model Driven Approach to Represent Sequence Diagrams as Free Choice Petri Nets
Model Driven Development (MDD) aims to promote the role of modeling in Software Engineering. Enterprise systems and architectures are often modeled via multiple representations. F...
Mohamed Ariff Ameedeen, Behzad Bordbar
FPL
2008
Springer
157views Hardware» more  FPL 2008»
13 years 10 months ago
Chosen-message SPA attacks against FPGA-based RSA hardware implementations
This paper presents SPA (Simple Power Analysis) attacks against public-key cryptosystems implemented on an FPGA platform. The SPA attack investigates a power waveform generated by...
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Ak...
INFOSCALE
2007
ACM
13 years 10 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
BILDMED
2007
142views Algorithms» more  BILDMED 2007»
13 years 10 months ago
Interfacing Global and Local CBIR Systems for Medical Image Retrieval
Abstract. Contemporary picture archiving and communication systems are limited in managing large and varied image collections, because content-based image retrieval (CBIR) methods ...
Sameer Antani, Thomas Martin Deserno, L. Rodney Lo...
CIDR
2007
111views Algorithms» more  CIDR 2007»
13 years 10 months ago
The Case for a Signal-Oriented Data Stream Management System
Sensors capable of sensing phenomena at high data rates—on the order of tens to hundreds of thousands of samples per second—are useful in many industrial, civil engineering, s...
Lewis Girod, Yuan Mei, Ryan Newton, Stanislav Rost...
« Prev « First page 1575 / 1701 Last » Next »