Sciweavers

3897 search results - page 718 / 780
» complexity 2010
Sort
View
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
14 years 23 days ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
KDD
2010
ACM
199views Data Mining» more  KDD 2010»
14 years 21 days ago
Online discovery and maintenance of time series motifs
The detection of repeated subsequences, time series motifs, is a problem which has been shown to have great utility for several higher-level data mining algorithms, including clas...
Abdullah Mueen, Eamonn J. Keogh
AFRICACRYPT
2010
Springer
14 years 6 days ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley
APGV
2010
ACM
309views Visualization» more  APGV 2010»
14 years 6 days ago
Evaluating the effectiveness of visualization techniques for schematic diagrams in maintenance tasks
In order to perform daily maintenance and repair tasks in complex electrical and mechanical systems, technicians commonly utilize a large number of diagrams and documents detailin...
SungYe Kim, Insoo Woo, Ross Maciejewski, David S. ...
ASPLOS
2010
ACM
14 years 6 days ago
Fairness via source throttling: a configurable and high-performance fairness substrate for multi-core memory systems
Cores in a chip-multiprocessor (CMP) system share multiple hardware resources in the memory subsystem. If resource sharing is unfair, some applications can be delayed significantl...
Eiman Ebrahimi, Chang Joo Lee, Onur Mutlu, Yale N....