Sciweavers

758 search results - page 62 / 152
» Timing Analysis of Optimised Code
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 10 months ago
Towards Performance Measurement And Metrics Based Analysis of PLA Applications
This article is about a measurement analysis based approach to help software practitioners in managing the additional level complexities and variabilities in software product line...
Zeeshan Ahmed
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
13 years 8 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
CCS
2007
ACM
14 years 2 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
LCTRTS
1999
Springer
14 years 2 months ago
Live Memory Analysis for Garbage Collection in Embedded Systems
Real-time garbage collection is essential if object-oriented languages (in particular, Java) are to become predictable enough for real-time embedded systems. Although techniques f...
Patrik Persson
PPSN
2004
Springer
14 years 3 months ago
On the Importance of Information Speed in Structured Populations
A radius–based separation of selection and recombination spheres in diffusion model EAs is introduced, enabling a new taxonomy, oriented towards information flow analysis. It a...
Mike Preuss, Christian Lasarczyk