Sciweavers

3667 search results - page 534 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
AVI
2010
15 years 4 months ago
An architecture and a visual interface for tagging the 3D web
Content classification performed by end users is spreading through the web. Most of the work done so far is related to the hypermedia web. In spite of that, there is a growing mas...
Fabio Pittarello
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 4 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
108
Voted
FSTTCS
2008
Springer
15 years 4 months ago
Graph Games on Ordinals
We consider an extension of Church’s synthesis problem to ordinals by adding limit transitions to graph games. We consider game arenas where these limit transitions are defined...
Julien Cristau, Florian Horn
108
Voted
BMCBI
2008
123views more  BMCBI 2008»
15 years 3 months ago
Ori-Finder: A web-based system for finding oriCs in unannotated bacterial genomes
Background: Chromosomal replication is the central event in the bacterial cell cycle. Identification of replication origins (oriCs) is necessary for almost all newly sequenced bac...
Feng Gao, Chun-Ting Zhang
119
Voted
COMPUTER
2006
98views more  COMPUTER 2006»
15 years 3 months ago
Componentization: The Visitor Example
: In software design, laziness is a virtue: it's better to reuse than to redo. Design patterns are a good illustration. Patterns, a major advance in software architecture, pro...
Bertrand Meyer, Karine Arnout