Sciweavers

1548 search results - page 215 / 310
» Estimating Software Vulnerabilities
Sort
View
ISSS
1998
IEEE
103views Hardware» more  ISSS 1998»
15 years 3 months ago
False Path Analysis Based on a Hierarchical Control Representation
False path analysis is an activity with applications in a variety of computer science and engineering domains like for instance high-level synthesis, worst case execution time est...
Apostolos A. Kountouris, Christophe Wolinski
MEDIAFORENSICS
2010
15 years 23 days ago
Digital image authentication from thumbnails
We describe how to exploit the formation and storage of an embedded image thumbnail for image authentication. The creation of a thumbnail is modeled with a series of filtering ope...
Eric Kee, Hany Farid
WCE
2007
15 years 14 days ago
Simulating the Latent Effect of Attrition on Project Management
Staff attrition is a problem often faced by software development organizations. We used process modeling and simulation to estimate the effect of different staffing policies on th...
P. K. Suri, Rachna Soni
IEE
2008
100views more  IEE 2008»
14 years 11 months ago
A lightweight technique for assessing risks in requirements analysis
: A simple and practical technique for assessing the risks, that is, the potential for error, and consequent loss, in software system development, acquired during a requirements en...
Kenneth Boness, Anthony Finkelstein, Rachel Harris...
TC
2010
14 years 6 months ago
FPGA Designs with Optimized Logarithmic Arithmetic
Using a general polynomial approximation approach, we present an arithmetic library generator for the logarithmic number system (LNS). The generator produces optimized LNS arithmet...
Haohuan Fu, Oskar Mencer, Wayne Luk