Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
This paper presents a model of incremental change that consists of concept location, impact analysis, actualization, change propagation, supporting refactorings, and testing. Repe...
Unchecked errors are especially pernicious in operating system file management code. Transient or permanent hardware failures are inevitable, and error-management bugs at the fi...
Diffusion spectrum imaging (DSI) can map complex fiber microstructures in tissues by characterizing their 3-D water diffusion spectra. However, a long acquisition time is required ...
Where the Object-Oriented paradigm set about abstracting objects, iented (AO) theory draws on Psychology to abstract mentalist notions like: beliefs, perceptions, goals, and intent...