Sciweavers

2336 search results - page 283 / 468
» A Proposed Methodology for Web Development
Sort
View
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
14 years 3 months ago
Multi-channel Attacks
We introduce multi-channel attacks, i.e., side-channel attacks which utilize multiple side-channels such as power and EM simultaneously. We propose an adversarial model which combi...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
DSN
2000
IEEE
14 years 2 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
IUI
1997
ACM
14 years 2 months ago
Decision Making in Intelligent User Interfaces
Intelligent user interfaces are characterised by their capability to adapt at run-time and make several communication decisions concerning ‘what’, ‘when’, ‘why’ and â€...
Constantine Stephanidis, Charalampos Karagiannidis...
SIGIR
2010
ACM
14 years 2 months ago
Reusable test collections through experimental design
Portable, reusable test collections are a vital part of research and development in information retrieval. Reusability is difficult to assess, however. The standard approach— si...
Ben Carterette, Evangelos Kanoulas, Virgiliu Pavlu...
GLVLSI
2007
IEEE
151views VLSI» more  GLVLSI 2007»
14 years 2 months ago
Hand-in-hand verification of high-level synthesis
This paper describes a formal verification methodology of highnthesis (HLS) process. The abstraction level of the input to HLS is so high compared to that of the output that the v...
Chandan Karfa, Dipankar Sarkar, Chittaranjan A. Ma...