Sciweavers

3726 search results - page 589 / 746
» Software Services and Software Maintenance
Sort
View
CCR
2011
14 years 10 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
JOC
2010
92views more  JOC 2010»
14 years 10 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
CODES
2011
IEEE
14 years 3 months ago
Adaptive resource management for simultaneous multitasking in mixed-grained reconfigurable multi-core processors
We propose a novel scheme for run-time management of mixedgrained reconfigurable fabric for the purpose of simultaneous multi-tasking in multi-core reconfigurable processors. Trad...
Waheed Ahmed, Muhammad Shafique, Lars Bauer, J&oum...
DOCENG
2011
ACM
14 years 3 months ago
A framework with tools for designing web-based geographic applications
Many Web-based geographic applications have been developed in various domains, such as tourism, education, surveillance and military. However, developing such applications is a cu...
The Nhan Luong, Sébastien Laborie, Thierry ...
140
Voted
IUI
2012
ACM
13 years 11 months ago
Mobile texting: can post-ASR correction solve the issues? an experimental study on gain vs. costs
The next big step in embedded, mobile speech recognition will be to allow completely free input as it is needed for messaging like SMS or email. However, unconstrained dictation r...
Michael Feld, Saeedeh Momtazi, Farina Freigang, Di...