Conference paper
Placement of multimedia blocks on zoned disks
Renu Tewari, Richard P. King, et al.
IS&T/SPIE Electronic Imaging 1996
Separation of concerns and layers of abstraction have long been advocated by proponents of programming methodology and have been used effectively for building large scale systems. Developments on power analysis attacks on cryptographic implementations were used to raise some questions about the applicability of these approaches especially to cryptography and security. Some of the formal methods are presented.
Renu Tewari, Richard P. King, et al.
IS&T/SPIE Electronic Imaging 1996
Chi-Leung Wong, Zehra Sura, et al.
I-SPAN 2002
Gal Badishi, Idit Keidar, et al.
IEEE TDSC
Matthias Kaiserswerth
IEEE/ACM Transactions on Networking