Sciweavers

4079 search results - page 342 / 816
» Differential Testing for Software
Sort
View
ESORICS
2006
Springer
15 years 8 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
FDTC
2006
Springer
117views Cryptology» more  FDTC 2006»
15 years 8 months ago
DPA on Faulty Cryptographic Hardware and Countermeasures
Abstract. Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reli...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
JBI
2008
159views Bioinformatics» more  JBI 2008»
15 years 4 months ago
SEGS: Search for enriched gene sets in microarray data
Gene Ontology (GO) terms are often used to interpret the results of microarray experiments. The most common approach is to perform Fisher's exact tests to find gene sets anno...
Igor Trajkovski, Nada Lavrac, Jakub Tolar
RTSS
2005
IEEE
15 years 10 months ago
Generalized Performance Management of Multi-Class Real-Time Imprecise Data Services
The intricacy of real-time data service management increases mainly due to the emergence of applications operating in open and unpredictable environments, increases in software co...
Mehdi Amirijoo, Nicolas Chaufette, Jörgen Han...
MATA
2001
Springer
15 years 9 months ago
Multipoint-to-Point Routing with QoS Guarantees Using Mobile Agents
To overcome the shortcomings of existing IP networks and to facilitate the overall quality-of-service (QoS) provisioning in the near-future networks, new technologies such as Multi...
Sergio González-Valenzuela, Victor C. M. Le...