Sciweavers

14704 search results - page 2895 / 2941
» computer 2007
Sort
View
ICN
2007
Springer
14 years 4 months ago
Active Peer to Peer
—Peer to peer is an important way for files sharing. In existing P2P systems, users need to query and retrieve files, and have to know some knowledge, such as file names, keyword...
Xuelian Lin, Jinpeng Huai, Xudong Liu, Jun Han
ICSOC
2007
Springer
14 years 4 months ago
Pattern Based SOA Deployment
Abstract. A key function of a Service Oriented Architecture is the separation between business logic and the platform of its implementation and deployment. Much of the focus in SOA...
William Arnold, Tamar Eilam, Michael H. Kalantar, ...
IESS
2007
Springer
165views Hardware» more  IESS 2007»
14 years 4 months ago
Data Reuse Driven Memory and Network-On-Chip Co-Synthesis
NoCs present a possible communication infrastructure solution to deal with increased design complexity and shrinking time-to-market. The communication infrastructure is a signific...
Ilya Issenin, Nikil Dutt
IH
2007
Springer
14 years 4 months ago
Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction
Abstract. Hard decisions constitute the major problem in digital watermarking applications, especially when content adaptive embedding methods are used. Soft-decision decoding, on ...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 4 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
« Prev « First page 2895 / 2941 Last » Next »