Sciweavers

3554 search results - page 149 / 711
» Estimating software based on use case points
Sort
View
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 8 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
ISWC
2006
IEEE
15 years 10 months ago
Experience Map Creation by Virtual WLAN Location Estimation
We propose a non-cumbersome automatic location estimation method based on an easily accessible infrastructure: the 802.11 LAN. The method consists of two phases: a map-preparation...
Kenji Matsuzawa, Kenji Mase, Yasushi Hirano, Shoji...
JSS
2006
97views more  JSS 2006»
15 years 4 months ago
An empirical study into class testability
In this paper we investigate factors of the testability of object-oriented software systems. The starting point is given by a study of the literature to obtain both an initial mod...
Magiel Bruntink, Arie van Deursen
ICIP
2006
IEEE
16 years 6 months ago
Improved Unsymmetric-Cross Multi-Hexagon-Grid Search Algorithm for Fast Block Motion Estimation
We develop a set of new motion estimation (ME) algorithms based mainly on Unsymmetric-Cross Multi-Hexagon-Grid Search (UMH). The original algorithms are improved by applying the S...
Janne Heikkilä, Tuukka Toivonen
ESAS
2005
Springer
15 years 10 months ago
Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...