Sciweavers

1001 search results - page 7 / 201
» Myths in Software Engineering: From the Other Side
Sort
View
86
Voted
RE
2004
Springer
15 years 2 months ago
From Goals to Aspects: Discovering Aspects from Requirements Goal Models
Aspect-oriented programming (AOP) has been attracting much attention in the Software Engineering community by advocating that programs should be structured according to programmer...
Yijun Yu, Julio Cesar Sampaio do Prado Leite, John...
ASM
2010
ASM
15 years 24 days ago
Starting B Specifications from Use Cases
The B method is one of the most used formal methods, when reactive systems is under question, due to good support for refinement. However, obtaining the formal model from requireme...
Thiago C. de Sousa, Aryldo G. Russo
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
15 years 2 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak
AFRICACRYPT
2010
Springer
15 years 24 days ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley
SIGSOFT
2007
ACM
15 years 10 months ago
State coverage: a structural test adequacy criterion for behavior checking
We propose a new language-independent, structural test adequacy criterion called state coverage. State coverage measures whether unit-level tests check the outputs and side effect...
Ken Koster, David Kao