Sciweavers

3056 search results - page 173 / 612
» Open Implementation Analysis and Design
Sort
View
IJDE
2006
95views more  IJDE 2006»
15 years 4 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
153
Voted
ICISC
2007
117views Cryptology» more  ICISC 2007»
15 years 5 months ago
Side Channel Attacks on Irregularly Decimated Generators
Abstract. We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are timing analysis, phase-shift fault analysis ...
Chuan-Wen Loe, Khoongming Khoo
FPGA
2004
ACM
119views FPGA» more  FPGA 2004»
15 years 9 months ago
A quantitative analysis of the speedup factors of FPGAs over processors
The speedup over a microprocessor that can be achieved by implementing some programs on an FPGA has been extensively reported. This paper presents an analysis, both quantitative a...
Zhi Guo, Walid A. Najjar, Frank Vahid, Kees A. Vis...
141
Voted
CLUSTER
2006
IEEE
15 years 7 months ago
STAS: A Scalability Testing and Analysis System
Scalability is a crucial factor in performance evaluation and analysis of parallel and distributed systems. Much effort has been devoted to scalability research and several metric...
Yong Chen, Xian-He Sun
135
Voted
SPLC
2008
15 years 5 months ago
Functional Testing of Feature Model Analysis Tools. A First Step
The automated analysis of Feature Models (FMs) focuses on the usage of different logic paradigms and solvers to implement a number of analysis operations on FMs. The implementatio...
Sergio Segura, David Benavides, Antonio Ruiz Cort&...