Sciweavers

3639 search results - page 57 / 728
» Provenance as Dependency Analysis
Sort
View
ARITH
2005
IEEE
15 years 3 months ago
Data Dependent Power Use in Multipliers
Recent research has demonstrated the vulnerability of certain smart card architectures to power and electromagnetic analysis when multiplier operations are insufficiently shielde...
Colin D. Walter, David Samyde
HASE
1999
IEEE
15 years 2 months ago
Quantitative Evaluation of Dependability Critical Systems Based on Guarded Statechart Models
The paper introduces a method to model embedded dependability-critical systems as AND-composition of Guarded Statecharts which are special UMLstatecharts. With Guarded Statecharts...
Mario Dal Cin, Gábor Huszerl, Konstantinos ...
IEEEARES
2008
IEEE
15 years 4 months ago
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach
The analysis of business solutions is one of critical issues in industry. Risk is one of the most preeminent and accepted metrics for the evaluation of business solutions. Not sur...
Yudistira Asnar, Rocco Moretti, Maurizio Sebastian...
QEST
2006
IEEE
15 years 3 months ago
On Single-Class Load-Dependent Normalizing Constant Equations
Normalizing constant recurrence equations play an important role in the exact analysis of load-independent (LI) product-form queueing networks. However, they have not been extende...
Giuliano Casale
HICSS
2005
IEEE
146views Biometrics» more  HICSS 2005»
15 years 3 months ago
Maintaining Continuous Dependability in Sensor-Based Context-Aware Pervasive Computing Systems
Sensors are often indicative of events of interest, or events which a system should be aware of and should react to. In particular, such indications may reflect unsteadiness or in...
Amir Padovitz, Arkady B. Zaslavsky, Seng Wai Loke,...