Sciweavers

1548 search results - page 135 / 310
» Estimating Software Vulnerabilities
Sort
View
HICSS
2012
IEEE
293views Biometrics» more  HICSS 2012»
13 years 7 months ago
Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters
—Security will be critical for the wireless interface offered by soon-to-be-ubiquitous smart meters — since if not secure, this technology will provide an remotely accessible a...
Travis Goodspeed, Sergey Bratus, Ricky Melgares, R...
AGILEDC
2006
IEEE
15 years 5 months ago
The Pairing Session as the Atomic Unit of Work
We have an Extreme Programming team at a small company dedicated to the Agile approach. Our team of 7 developers decided to use the pairing session as the fundamental unit of work...
Troy Frever, Paul Ingalls
TASLP
2011
14 years 6 months ago
Source-Filter-Based Single-Channel Speech Separation Using Pitch Information
—In this paper, we investigate the source–filter-based approach for single-channel speech separation. We incorporate source-driven aspects by multi-pitch estimation in the mod...
Michael Stark, Michael Wohlmayr, Franz Pernkopf
VLSI
2012
Springer
13 years 7 months ago
A Signature-Based Power Model for MPSoC on FPGA
e technique is based on abstract execution profiles, called event signatures, and it operates at a higher level of abstraction than, for example, commonly used instruction-set sim...
Roberta Piscitelli, Andy D. Pimentel
SEAA
2008
IEEE
15 years 5 months ago
A Meta-model for the Assessment of Non-Functional Requirement Size
Non-functional requirements (NFRs) pose unique challenges in estimating the effort it would take to implement them. This is mainly because of their unique nature; NFRs are subject...
Mohamad Kassab, Maya Daneva, Olga Ormandjieva