Sciweavers

1938 search results - page 124 / 388
» Dependable Software
Sort
View
136
Voted
USS
2008
15 years 6 months ago
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software
Remote error analysis aims at timely detection and remedy of software vulnerabilities through analyzing runtime errors that occur on the client. This objective can only be achieve...
Rui Wang 0010, XiaoFeng Wang, Zhuowei Li
141
Voted
ICISC
2009
132views Cryptology» more  ICISC 2009»
15 years 1 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
105
Voted
CHI
2007
ACM
16 years 4 months ago
Software or wetware?: discovering when and why people use digital prosthetic memory
Our lives are full of memorable and important moments, as well as important items of information. The last few years have seen the proliferation of digital devices intended to sup...
Steve Whittaker, Vaiva Kalnikaité
179
Voted
SUTC
2006
IEEE
15 years 9 months ago
Detection and Repair of Software Errors in Hierarchical Sensor Networks
Abstract— Sensor networks are being increasingly deployed for collecting critical data in various applications. Once deployed, a sensor network may experience faults at the indiv...
Douglas Herbert, Yung-Hsiang Lu, Saurabh Bagchi, Z...
138
Voted
HICSS
2003
IEEE
146views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Model for the Emergence and Diffusion of Software Standards
The economic impact of the growth dynamic of standards is often described from a macroeconomic point of view, employing network effect theory and models dealing with externalities...
Tim Stockheim, Michael Schwind, Wolfgang Köni...