Sciweavers

2392 search results - page 336 / 479
» informs 2000
Sort
View
CHES
2000
Springer
111views Cryptology» more  CHES 2000»
14 years 2 months ago
How to Explain Side-Channel Leakage to Your Kids
This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three diļ¬...
David Naccache, Michael Tunstall
CONCUR
2000
Springer
14 years 2 months ago
LP Deadlock Checking Using Partial Order Dependencies
Model checking based on the causal partial order semantics of Petri nets is an approach widely applied to cope with the state space explosion problem. One of the ways to exploit su...
Victor Khomenko, Maciej Koutny
COORDINATION
2000
Springer
14 years 2 months ago
An Agent Mediated Approach to Dynamic Change in Coordination Policies
Distributed information systems for decision-support, logistics, and e-commerce involve coordination of autonomous information resources and clients according to specific domain in...
Prasanta K. Bose, Mark G. Matthews
DL
2000
Springer
163views Digital Library» more  DL 2000»
14 years 2 months ago
Developing services for open eprint archives: globalisation, integration and the impact of links
The rapid growth of scholarly information resources available in electronic form and their organisation by digital libraries is proving fertile ground for the development of sophi...
Steve Hitchcock, Les Carr, Zhuoan Jiao, Donna Berg...
DSOM
2000
Springer
14 years 2 months ago
Operational Data Analysis: Improved Predictions Using Multi-computer Pattern Detection
Operational Data Analysis (ODA) automatically 1) monitors the performance of a computer through time, 2) stores such information in a data repository, 3) applies data-mining techn...
Ricardo Vilalta, Chidanand Apté, Sholom M. ...