Sciweavers

1943 search results - page 289 / 389
» End-to-End Integration Testing
Sort
View
144
Voted
WETICE
2005
IEEE
15 years 9 months ago
Application of Lightweight Formal Methods to Software Security
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...
David P. Gilliam, John D. Powell, Matt Bishop
126
Voted
ISLPED
2005
ACM
99views Hardware» more  ISLPED 2005»
15 years 9 months ago
Self-timed circuits for energy harvesting AC power supplies
The recent explosion in capability of embedded and portable electronics has not been matched by battery technology. The slow growth of battery energy density has limited device li...
Jeff Siebert, Jamie Collier, Rajeevan Amirtharajah
SIGIR
2005
ACM
15 years 9 months ago
Indexing emails and email threads for retrieval
Electronic mail poses a number of unusual challenges for the design of information retrieval systems and test collections, including informal expression, conversational structure,...
Yejun Wu, Douglas W. Oard
138
Voted
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 9 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
HUC
2005
Springer
15 years 9 months ago
Scanning Objects in the Wild: Assessing an Object Triggered Information System
We describe the results of a field deployment of the AURA system which links online content to physical objects through machine readable tags. AURA runs on commercially available p...
A. J. Bernheim Brush, Tammara Combs Turner, Marc A...