Sciweavers

851 search results - page 126 / 171
» History Effects and Verification
Sort
View
DAC
2005
ACM
16 years 24 days ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
SIGSOFT
2008
ACM
16 years 17 days ago
Towards compositional synthesis of evolving systems
Synthesis of system configurations from a given set of features is an important and very challenging problem. This paper makes a step towards this goal by describing an efficient ...
Shiva Nejati, Mehrdad Sabetzadeh, Marsha Chechik, ...
SIGSOFT
2007
ACM
16 years 17 days ago
Improving test case generation for web applications using automated interface discovery
With the growing complexity of web applications, identifying web interfaces that can be used for testing such applications has become increasingly challenging. Many techniques tha...
William G. J. Halfond, Alessandro Orso
SIGSOFT
2003
ACM
16 years 17 days ago
Leveraging field data for impact analysis and regression testing
Software products are often released with missing functionality, errors, or incompatibilities that may result in failures, inferior performances, or user dissatisfaction. In previ...
Alessandro Orso, Taweesup Apiwattanapong, Mary Jea...
WWW
2007
ACM
16 years 15 days ago
Tag clouds for summarizing web search results
In this paper, we describe an application, PubCloud that uses tag clouds for the summarization of results from queries over the PubMed database of biomedical literature. PubCloud ...
Benjamin M. Good, Byron Yu-Lin Kuo, Mark D. Wilkin...