نتایج جستجو برای: access pattern
تعداد نتایج: 666151 فیلتر نتایج به سال:
It has been argued that future image coding techniques should allow for "midstream access", i.e. allow image query, retrieval, and modification to proceed on the compressed representation [18]. In a recent work [1], we introduced the colour visual pattern image coding (CVPIC) technique for colour image compression. An image is divided into blocks and each block coded locally by mapping it to on...
Cache attacks are a special form of implementation attacks and focus on the exploitation of weaknesses in the implementation of a specific algorithm. We demonstrate an access-driven cache attack, which is based on the analysis of memory-access patterns due to the T-table accesses of the Advanced Encryption Standard (AES). Based on the work of Tromer et al. [20] we gather the cachememory access ...
This paper presents a set of transformation rules for transforming a non-secure interaction model to a secure interaction model using an access control pattern. The transformation rules resolve conflicts, uncertainties and type mismatches that may arise during pattern application. We demonstrate a case study using the Mandatory Access Control pattern and a defense messaging system in the milita...
In contemporary software development, it is crucial to adhere design patterns because well-organized and readily maintainable source code facilitates bug fixes the development of new features. A carefully selected set can have a significant impact on productivity development. Data Access Object (DAO) frequently used pattern that provides an abstraction layer between application database present...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید