Sciweavers

714 search results - page 126 / 143
» Verification and Compliance Testing
Sort
View
112
Voted
COMPSAC
2007
IEEE
15 years 4 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
DAC
2007
ACM
15 years 4 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
ICCS
2007
Springer
15 years 4 months ago
Efficient Measurement of the Eye Blinking by Using Decision Function for Intelligent Vehicles
In this paper, we propose an efficient measurement of the eye blinking for drowsy driver detection system that is one of the driver safety systems for the intelligent vehicle. Howe...
Ilkwon Park, Jung-Ho Ahn, Hyeran Byun
91
Voted
CC
2006
Springer
15 years 4 months ago
Interprocedural Dataflow Analysis in the Presence of Large Libraries
Interprocedural dataflow analysis has a large number of uses for software optimization, maintenance, testing, and verification. For software built with reusable components, the tra...
Atanas Rountev, Scott Kagan, Thomas J. Marlowe
101
Voted
DSD
2004
IEEE
129views Hardware» more  DSD 2004»
15 years 4 months ago
Functional Validation of Programmable Architectures
Validation of programmable architectures, consisting of processor cores, coprocessors, and memory subsystems, is one of the major bottlenecks in current Systemon-Chip design metho...
Prabhat Mishra, Nikil D. Dutt