Sciweavers

3726 search results - page 582 / 746
» Software Services and Software Maintenance
Sort
View
EUROMICRO
2004
IEEE
15 years 7 months ago
Handover in Mobile Communication Networks: Who is in Control Anyway?
The migration from 3rd generation mobile communication networks to 4th generation, purely IP-based networks leads to new chances, but also great risks for the traditional mobile n...
Frank A. Zdarsky, Jens B. Schmitt
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 7 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
FASE
2006
Springer
15 years 7 months ago
A Graph-Based Approach to Transform XML Documents
Abstract. As XML diffusion keeps increasing, it is today common practice for most developers to deal with XML parsing and transformation. XML is used as format to e.g. render data,...
Gabriele Taentzer, Giovanni Toffetti Carughi
UIST
1995
ACM
15 years 7 months ago
Migratory Applications
We introduce a new genre of user interface applications that can migrate from one machine to another, taking their user interface and application contexts with them, and continue ...
Krishna Bharat, Luca Cardelli
CBSE
2008
Springer
15 years 5 months ago
Ada-CCM: Component-Based Technology for Distributed Real-Time Systems
: This paper proposes a technology for the development of distributed real-time component-based applications, which takes advantage of the features that Ada offers for the developm...
Patricia López Martínez, José...