Sciweavers

7526 search results - page 1394 / 1506
» The Design and Implementation of the A2QM3 System
Sort
View
CCS
2007
ACM
14 years 3 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
14 years 3 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
CISSE
2007
Springer
14 years 3 months ago
Intuitive Interface for the Exploration of Volumetric Datasets
Conventional human-computer interfaces for the exploration of volume datasets employ the mouse as an input device. Specifying an oblique orientation for a crosssectional plane thr...
Rahul Sarkar, Chrishnika de Almeida, Noureen Syed,...
COORDINATION
2007
Springer
14 years 3 months ago
A Coordination Model for Triplespace Computing
Recent advances in middleware technologies propose semantics-aware tuplespaces as an instrument for coping with the requirements of scalability, heterogeneity and dynamism arising ...
Elena Paslaru Bontas Simperl, Reto Krummenacher, L...
ECOOP
2007
Springer
14 years 3 months ago
Generational Real-Time Garbage Collection
Abstract. While real-time garbage collection is now available in production virtual machines, the lack of generational capability means applications with high allocation rates are ...
Daniel Frampton, David F. Bacon, Perry Cheng, Davi...
« Prev « First page 1394 / 1506 Last » Next »