Sciweavers

3330 search results - page 124 / 666
» software 2010
Sort
View
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
13 years 7 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
FPL
2010
Springer
146views Hardware» more  FPL 2010»
13 years 7 months ago
Software Managed Distributed Memories in MPPAs
When utilizing reconfigurable hardware there are many applications that will require more memory than is available in a single hardware block. While FPGAs have tools and mechanisms...
Robin Panda, Jimmy Xu, Scott Hauck
IPPS
2010
IEEE
13 years 7 months ago
Performance prediction of weather forecasting software on multicore systems
Performance prediction is valuable in different areas of computing. The popularity of lease-based access to high performance computing resources particularly benefits from accurate...
Javier Delgado, Seyed Masoud Sadjadi, Marion Brigh...
ISOLA
2010
Springer
13 years 7 months ago
Design Choices for High-Confidence Distributed Real-Time Software
Safety-critical distributed real-time systems, such as networked medical devices, must operate according to their specification, because incorrect behaviour can have fatal conseque...
Sebastian Fischmeister, Akramul Azim
RV
2010
Springer
153views Hardware» more  RV 2010»
13 years 7 months ago
Run-Time Verification of Networked Software
Most applications that are in use today inter-operate with other applications, so-called peers, over a network. The analysis of such distributed applications requires that the effe...
Cyrille Valentin Artho