Sciweavers

1039 search results - page 171 / 208
» Using GXL for exchanging business process models
Sort
View
147
Voted
RE
1999
Springer
15 years 8 months ago
Bridging the Gap Between Past and Future in RE: A Scenario-Based Approach
Requirements Engineering (RE) investigates the impact of a future-oriented change vision, but the move towards this vision must consider a context heavily shaped by the past. As R...
Peter Haumer, Matthias Jarke, Klaus Pohl, Patrick ...
CHES
2006
Springer
146views Cryptology» more  CHES 2006»
15 years 7 months ago
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits
This paper presents a Path Swapping (PS) method which enables to enhance the security of Quasi Delay Insensitive Asynchronous Circuits against Power Analysis (PA) attack. This appr...
G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin
152
Voted
LREC
2008
172views Education» more  LREC 2008»
15 years 5 months ago
A Common Multimedia Annotation Framework for Cross Linking Cultural Heritage Digital Collections
In the context of the CATCH research program that is currently carried out at a number of large Dutch cultural heritage institutions our ambition is to combine and exchange hetero...
Hennie Brugman, Véronique Malaisé, L...
134
Voted
ENTCS
2006
155views more  ENTCS 2006»
15 years 3 months ago
Biomolecular Agents as Multi-behavioural Concurrent Objects
In recent years, there has been increasing interest in computational models of biological systems based on various calculi of communicating processes, such as the stochastic pi-ca...
Denys Duchier, Céline Kuttler
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
15 years 10 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...