Sciweavers

1548 search results - page 272 / 310
» Estimating Software Vulnerabilities
Sort
View
GI
2007
Springer
15 years 2 months ago
Creating Test-Cases Incrementally with Model-Checkers
: Test-case generation with model-checkers is a promising field of research in software testing. Model-checker based approaches offer many advantages: They are fully automated, the...
Gordon Fraser, Franz Wotawa
ANSS
2004
IEEE
15 years 2 months ago
Markov Model Based Congestion Control for TCP
The Random Early Detection (RED) scheme for congestion control in TCP is well known over a decade. Due to a number of control parameters in RED, it cannot make acceptable packet-d...
Shan Suthaharan
CHES
2006
Springer
117views Cryptology» more  CHES 2006»
15 years 2 months ago
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
This paper describes high-resolution waveform matching based on a Phase-Only Correlation (POC) technique and its application for a side-channel attack. Such attacks, such as Simple...
Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafum...
ECCV
2010
Springer
15 years 2 months ago
Descattering Transmission via Angular Filtering
Abstract. We describe a single-shot method to differentiate unscattered and scattered components of light transmission through a heterogeneous translucent material. Directly-transm...
SGP
2007
15 years 1 months ago
Example-based skeleton extraction
We present a method for extracting a hierarchical, rigid skeleton from a set of example poses. We then use this skeleton to not only reproduce the example poses, but create new de...
Scott Schaefer, Can Yuksel