Sciweavers

6978 search results - page 98 / 1396
» Reframing Requirements Analysis
Sort
View
CHES
2010
Springer
214views Cryptology» more  CHES 2010»
14 years 11 months ago
Correlation-Enhanced Power Analysis Collision Attack
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, h...
Amir Moradi, Oliver Mischke, Thomas Eisenbarth
COMPSAC
2010
IEEE
14 years 8 months ago
An Analysis of Tool-Based Research in Software Engineering
Many research approaches in software engineering propose models or extensions to existing models. This includes system models, such as UML models, and project management artifacts,...
Jonas Helming, Maximilian Koegel, Hoda Naguib, Mir...
AND
2009
14 years 7 months ago
Tools for monitoring, visualizing, and refining collections of noisy documents
Developing better systems for document image analysis requires understanding errors, their sources, and their effects. The interactions between various processing steps are comple...
Daniel P. Lopresti, George Nagy
WCET
2007
14 years 11 months ago
Timing Analysis of Body Area Network Applications
Body area network (BAN) applications have stringent timing requirements. The timing behavior of a BAN application is determined not only by the software complexity, inputs, and ar...
Liang Yun, Abhik Roychoudhury, Tulika Mitra
ICPP
2009
IEEE
14 years 7 months ago
Mediacoop: Hierarchical Lookup for P2P-VoD Services
The random seeking in P2P-VoD system requires efficient lookup for "good" suppliers. The main challenge is that good suppliers should meet two requirements: "conten...
Tieying Zhang, Jianming Lv, Xueqi Cheng