Sciweavers

3104 search results - page 517 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
AFRICACRYPT
2010
Springer
15 years 10 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
ISSTA
2006
ACM
15 years 10 months ago
A regression tests selection technique for aspect-oriented programs
As the Aspect-Oriented Software Development gains popularity, there is growing interest as developing for existing object-oriented software aspects to address the crosscutting pro...
Guoqing Xu
SIGCSE
2006
ACM
139views Education» more  SIGCSE 2006»
15 years 9 months ago
Closing the loop on test creation: a question assessment mechanism for instructors
New accreditation requirements focus on education as a “continuous improvement process.” The most important part of such a process is that information gets fed back into the s...
Titus Winters, Tom Payne
ESCIENCE
2005
IEEE
15 years 9 months ago
On the Costs for Reliable Messaging in Web/Grid Service Environments
As Web Services have matured they have been substantially leveraged within the academic, research and business communities. An exemplar of this is the realignment, last year, of t...
Shrideep Pallickara, Geoffrey Fox, Beytullah Yildi...
LPAR
2004
Springer
15 years 9 months ago
The Dependency Pair Framework: Combining Techniques for Automated Termination Proofs
The dependency pair approach is one of the most powerful techniques for automated termination proofs of term rewrite systems. Up to now, it was regarded as one of several possible ...
Jürgen Giesl, René Thiemann, Peter Sch...