Sciweavers

2624 search results - page 455 / 525
» The 2LIP model and its implementations
Sort
View
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
14 years 3 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...
EMSOFT
2007
Springer
14 years 3 months ago
Loosely time-triggered architectures based on communication-by-sampling
We address the problem of mapping a set of processes which communicate synchronously on a distributed platform. The Time Triggered Architecture (TTA) proposed by Kopetz for the co...
Albert Benveniste, Paul Caspi, Marco Di Natale, Cl...
SAC
2005
ACM
14 years 2 months ago
Node clustering based on link delay in P2P networks
Peer-to-peer (P2P) has become an important computing model because of its adaptation, self-organization and autonomy etc. But efficient organization of the nodes in P2P networks i...
Wei Zheng, Sheng Zhang, Yi Ouyang, Fillia Makedon,...
ISSRE
2000
IEEE
14 years 1 months ago
Building Trust into OO Components Using a Genetic Analogy
Despite the growing interest for component-based systems, few works tackle the question of the trust we can bring into a component. This paper presents a method and a tool for bui...
Benoit Baudry, Vu Le Hanh, Jean-Marc Jéz&ea...
KDD
2003
ACM
129views Data Mining» more  KDD 2003»
14 years 9 months ago
Empirical comparisons of various voting methods in bagging
Finding effective methods for developing an ensemble of models has been an active research area of large-scale data mining in recent years. Models learned from data are often subj...
Kelvin T. Leung, Douglas Stott Parker Jr.