Sciweavers

405 search results - page 28 / 81
» Avatar-centric Risk Evaluation
Sort
View
90
Voted
DSN
2009
IEEE
14 years 7 months ago
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds
Distributed intelligence and secure interconnected communication networks constitute recognized key factors for the economic operation of electricity infrastructures in competitiv...
Giovanna Dondossola, Fabrizio Garrone, Judit Szant...
SEMWEB
2009
Springer
15 years 4 months ago
Recommendations for Qualitative Ontology Matching Evaluations
This paper suggests appropriate rules to set up ontology matching evaluations and for golden standard construction and use which can significantly improve the quality of the preci...
Aliaksandr Autayeu, Vincenzo Maltese, Pierre Andre...
ISSRE
2008
IEEE
15 years 4 months ago
Cost Curve Evaluation of Fault Prediction Models
Prediction of fault prone software components is one of the most researched problems in software engineering. Many statistical techniques have been proposed but there is no consen...
Yue Jiang, Bojan Cukic, Tim Menzies
ISPASS
2006
IEEE
15 years 3 months ago
Workload sanitation for performance evaluation
The performance of computer systems depends, among other things, on the workload. Performance evaluations are therefore often done using logs of workloads on current productions s...
Dror G. Feitelson, Dan Tsafrir
98
Voted
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 4 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...