Sciweavers

279 search results - page 54 / 56
» Sorting out software complexity
Sort
View
AFRICACRYPT
2010
Springer
13 years 10 months ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley
DILS
2008
Springer
13 years 9 months ago
VisGenome and Ensembl: Usability of Integrated Genome Maps
It is not always clear how best to represent integrated data sets, and which application and database features allow a scientist to take best advantage of data coming from various ...
Joanna Jakubowska, Ela Hunt, John McClure, Matthew...
CLIMA
2007
13 years 9 months ago
Plan-Coordination Mechanisms and the Price of Autonomy
Abstract. Task-based planning problems for multi-agent systems require multiple agents to find a joint plan for a constrained set of tasks. Typically, each agent receives a subset...
J. Renze Steenhuisen, Cees Witteveen, Yingqian Zha...
IADIS
2004
13 years 8 months ago
Moginma: an autonomous grid node monitoring agent
The accelerated development in grid computing has positioned it as a promising next generation computing platform. It enables the creation of virtual organizations (VO) for sharin...
Arshad Ali, Fawad Nazir, Hamid Abbas Burki, Tallat...
MC
2001
13 years 8 months ago
Towards a Task-Based System Administration Tool for Linux Systems
The growing popularity of computers in all areas of daily life leads to the situation that an increasing number of people with diverse know-how of computers and software use these...
Ernianti Hasibuan, Gerd Szwillus