Sciweavers

3441 search results - page 631 / 689
» Provenance of Software Development Processes
Sort
View
114
Voted
FLAIRS
2007
15 years 3 months ago
Semantic Relations: Modelling Issues, Proposals and Possible Applications
Semantic relations are an important element in the construction of ontology-based linguistic resources and models of problem domains. Nevertheless, they remain under-specified. Th...
Francisco Álvarez, Antonio Vaquero, Fernand...
LISA
2007
15 years 3 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
91
Voted
WSC
2007
15 years 3 months ago
Simulating air traffic blockage due to convective weather conditions
A Monte Carlo methodology is proposed for simulating air traffic blockage patterns under the impact of convective weather. The simulation utilizes probabilistic convective weather...
Liling Ren, Dawei Chang, Senay Solak, John-Paul Cl...
EIT
2008
IEEE
15 years 2 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
FMICS
2008
Springer
15 years 2 months ago
Extending Structural Test Coverage Criteria for Lustre Programs with Multi-clock Operators
Lustre is a formal synchronous declarative language widely used for modeling and specifying safety-critical applications in the elds of avionics, transportation or energy productio...
Virginia Papailiopoulou, Laya Madani, Lydie du Bou...