Sciweavers

365 search results - page 55 / 73
» The Strong Eternity Service
Sort
View
EUROMICRO
2004
IEEE
13 years 11 months ago
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks
The class of wireless and mobile networks features a dissimilar set of characteristics and constraints compared to traditional fixed networks. The various dimensions of these char...
Matthias Hollick, Ivan Martinovic, Tronje Krop, Iv...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
TES
2000
Springer
13 years 11 months ago
Active Rules for XML: A New Paradigm for E-Services
XML is rapidly becoming one of the most widely adopted technologies for information exchange and representation. As the use of XML becomes more widespread, we foresee the developme...
Angela Bonifati, Stefano Ceri, Stefano Paraboschi
ATAL
2008
Springer
13 years 9 months ago
Artificial agents learning human fairness
Recent advances in technology allow multi-agent systems to be deployed in cooperation with or as a service for humans. Typically, those systems are designed assuming individually ...
Steven de Jong, Karl Tuyls, Katja Verbeeck
HICSS
2007
IEEE
126views Biometrics» more  HICSS 2007»
13 years 9 months ago
Model Driven Design and Implementation of Statistical Surveys
We describe the evolution of a statistical survey design visual language from a standalone design-time modelling language into an environment supporting design, coordination, exec...
Chul Hwee Kim, John G. Hosking, John C. Grundy