Sciweavers

3792 search results - page 717 / 759
» Techniques for Trusted Software Engineering
Sort
View
138
Voted
IFIPTM
2009
119views Management» more  IFIPTM 2009»
14 years 10 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
ECEASST
2010
14 years 9 months ago
GUI Inspection from Source Code Analysis
Abstract: Graphical user interfaces (GUIs) are critical components of todays software. Given their increased relevance, correctness and usability of GUIs are becoming essential. Th...
João Carlos Silva 0002, José Creissa...
TASLP
2010
177views more  TASLP 2010»
14 years 7 months ago
A Watermarking-Based Method for Informed Source Separation of Audio Signals With a Single Sensor
In this paper, the issue of audio source separation from a single channel is addressed, i.e. the estimation of several source signals from a single observation of their mixture. Th...
Mathieu Parvaix, Laurent Girin, Jean-Marc Brossier
TC
2010
14 years 7 months ago
A Counter Architecture for Online DVFS Profitability Estimation
Dynamic voltage and frequency scaling (DVFS) is a well known and effective technique for reducing power consumption in modern microprocessors. An important concern though is to est...
Stijn Eyerman, Lieven Eeckhout
TCAD
2010
130views more  TCAD 2010»
14 years 7 months ago
On ATPG for Multiple Aggressor Crosstalk Faults
Crosstalk faults have emerged as a significant mechanism for circuit failure. Long signal nets are of particular concern because they tend to have a higher coupling capacitance to...
Kunal P. Ganeshpure, Sandip Kundu