Sciweavers

1548 search results - page 273 / 310
» Estimating Software Vulnerabilities
Sort
View
CAISE
2008
Springer
15 years 1 months ago
On Modeling and Analyzing Cost Factors in Information Systems Engineering
Introducing enterprise information systems (EIS) is usually associated with high costs. It is therefore crucial to understand those factors that determine or influence these costs....
Bela Mutschler, Manfred Reichert
CCS
2008
ACM
15 years 1 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
FPL
2008
Springer
207views Hardware» more  FPL 2008»
15 years 18 days ago
Bitstream compression techniques for Virtex 4 FPGAs
This paper examines the opportunity of using compression for accelerating the (re)configuration of FPGA devices, focusing on the choice of compression algorithms, and their hardwa...
Radu Stefan, Sorin Dan Cotofana
BILDMED
2007
148views Algorithms» more  BILDMED 2007»
15 years 16 days ago
Bayesian Vessel Extraction for Planning of Radiofrequency-Ablation
The software-assisted planning of radiofrequency-ablation of liver tumors calls for robust and fast methods to segment the tumor and surrounding vascular structures from clinical d...
Stephan Zidowitz, Johann Drexl, Tim Kröger, T...
CAINE
2007
15 years 16 days ago
A Novel Peak Detection Algorithm for Use in the Study of Machining Chip Segmentation
The study of how metal deforms and flows as parts are machined yields important insights into the metal cutting process. Improvements in high-speed digital imaging and image proce...
Eric Whitenton, Robert Ivester, Jarred Heigel