Sciweavers

91 search results - page 12 / 19
» A Systematic Framework for Grammar Testing
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 3 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
80
Voted
ICOST
2007
Springer
15 years 3 months ago
Characterizing Safety of Integrated Services in Home Network System
This paper formalizes three kinds of safety to be satisfied by networked appliances and services in the emerging home network system (HNS). The local safety is defined by safety ...
Ben Yan, Masahide Nakamura, Lydie du Bousquet, Ken...
77
Voted
ICIS
2000
14 years 11 months ago
Personalization of search engine services for effective retrieval and knowledge management
The Internet and corporate intranets provide far more information than anybody can absorb. People use search engines to find the information they require. However, these systems t...
Weiguo Fan, Michael D. Gordon, Praveen Pathak
69
Voted
OSDI
2008
ACM
15 years 9 months ago
Finding and Reproducing Heisenbugs in Concurrent Programs
Concurrency is pervasive in large systems. Unexpected interference among threads often results in "Heisenbugs" that are extremely difficult to reproduce and eliminate. W...
Gérard Basler, Iulian Neamtiu, Madanlal Mus...
KDD
2001
ACM
166views Data Mining» more  KDD 2001»
15 years 10 months ago
Generalized clustering, supervised learning, and data assignment
Clustering algorithms have become increasingly important in handling and analyzing data. Considerable work has been done in devising effective but increasingly specific clustering...
Annaka Kalton, Pat Langley, Kiri Wagstaff, Jungsoo...