Sciweavers

9316 search results - page 232 / 1864
» Analysis of traceback techniques
Sort
View
CHES
2006
Springer
74views Cryptology» more  CHES 2006»
15 years 9 months ago
Optically Enhanced Position-Locked Power Analysis
Abstract. This paper introduces a refinement of the power-analysis attack on integrated circuits. By using a laser to illuminate a specific area on the chip surface, the current th...
Sergei P. Skorobogatov
APNOMS
2008
Springer
15 years 7 months ago
Empirical Analysis of Application-Level Traffic Classification Using Supervised Machine Learning
Accurate application traffic classification and identification are important for network monitoring and analysis. The accuracy of traditional Internet application traffic classific...
Byungchul Park, Young J. Won, Mi-Jung Choi, Myung-...
ATVA
2008
Springer
159views Hardware» more  ATVA 2008»
15 years 7 months ago
Component-Based Design and Analysis of Embedded Systems with UPPAAL PORT
UPPAAL PORT is a new tool for component-based design and analysis of embedded systems. It operates on the hierarchically structured continuous time component modeling language Save...
John Håkansson, Jan Carlson, Aurelien Monot,...
CASCON
2007
104views Education» more  CASCON 2007»
15 years 7 months ago
Identifying fault-prone files using static analysis alerts through singular value decomposition
Static analysis tools tend to generate more alerts than a development team can reasonably examine without some form of guidance. In this paper, we propose a technique for leveragi...
Mark Sherriff, Sarah Smith Heckman, Mike Lake, Lau...
140
Voted
DAGSTUHL
1996
15 years 6 months ago
An Automatic Interprocedural Analysis for the Understanding of Scientific Application Programs
This paper reports on an approachfor improvingthe understandingof old programs which have become very complex due to numerous extensions. We have adapted partial evaluation techni...
Sandrine Blazy, Philippe Facon