Sciweavers

1548 search results - page 63 / 310
» Estimating Software Vulnerabilities
Sort
View
IPSN
2005
Springer
15 years 4 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
CLEIEJ
2007
203views more  CLEIEJ 2007»
14 years 11 months ago
Optimization Criteria for Effort Estimation using Fuzzy Technique
Effective cost estimation is the most challenging activity in software development. Software cost estimation is not an exact science. Cost estimation process involves a series of ...
Harish Mittal, Pradeep Bhatia
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
15 years 3 months ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe
TR
2010
159views Hardware» more  TR 2010»
14 years 5 months ago
Accelerated Degradation Tests Applied to Software Aging Experiments
Abstract--In the past ten years, the software aging phenomenon has been systematically researched, and recognized by both academic, and industry communities as an important obstacl...
Rivalino Matias, Pedro Alberto Barbetta, Kishor S....
DRM
2005
Springer
15 years 4 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...