Sciweavers

580 search results - page 22 / 116
» A Requirements Elicitation Approach Based in Templates and P...
Sort
View
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
13 years 11 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
ESSOS
2009
Springer
13 years 11 months ago
Pattern-Based Confidentiality-Preserving Refinement
Abstract. We present an approach to security requirements engineering, which makes use of special kinds of problem frames that serve to structure, characterize, analyze, and solve ...
Holger Schmidt
ECIS
2003
13 years 9 months ago
Towards a language/action theoretic approach to relationship analysis
Relationship analysis aims at supporting the eliciting and documenting of potential relationship structures of an application domain by providing analysts with a systematic techni...
Fahri Yetim, Michael P. Bieber
ICONIP
2010
13 years 5 months ago
Online Gesture Recognition for User Interface on Accelerometer Built-in Mobile Phones
Recently, several smart phones are equipped with a 3D-accelerometer that can be used for gesture-based user interface (UI). In order to utilize the gesture UI for the real-time sys...
BongWhan Choe, Jun-Ki Min, Sung-Bae Cho
ESEM
2007
ACM
13 years 11 months ago
Using Context Distance Measurement to Analyze Results across Studies
Providing robust decision support for software engineering (SE) requires the collection of data across multiple contexts so that one can begin to elicit the context variables that...
Daniela Cruzes, Victor R. Basili, Forrest Shull, M...