Sciweavers

1562 search results - page 21 / 313
» A case study in testing a network security algorithm
Sort
View
ERSA
2006
147views Hardware» more  ERSA 2006»
13 years 8 months ago
Code Partitioning for Reconfigurable High-Performance Computing: A Case Study
In this case study, various ways to partition a code between the microprocessor and FPGA are examined. Discrete image convolution operation with separable kernel is used as the ca...
Volodymyr V. Kindratenko
ICSM
2005
IEEE
14 years 1 months ago
An Empirical Comparison of Test Suite Reduction Techniques for User-Session-Based Testing of Web Applications
Automated cost-effective test strategies are needed to provide reliable, secure, and usable web applications. As a software maintainer updates an application, test cases must accu...
Sara Sprenkle, Sreedevi Sampath, Emily Gibson, Lor...
FASE
2004
Springer
14 years 24 days ago
Checking Absence of Illicit Applet Interactions: A Case Study
Abstract. This paper presents the use of a method – and its corresponding tool set – for compositional verification of applet interactions on a realistic industrial smart card...
Marieke Huisman, Dilian Gurov, Christoph Sprenger,...
SIGUCCS
2005
ACM
14 years 29 days ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
IJNSEC
2007
189views more  IJNSEC 2007»
13 years 7 months ago
When Fingerprints Are Combined with Iris - A Case Study: FVC2004 and CASIA
This paper presents novel studies on fusion strategies for personal identification using fingerprint and iris biometrics. The purpose of our paper is to investigate whether the ...
Alessandra Lumini, Loris Nanni