Sciweavers

339 search results - page 18 / 68
» An Experimental Framework for the Analysis and Validation of...
Sort
View
KBSE
2008
IEEE
14 years 2 months ago
Testing Peers' Volatility
—Peer-to-peer (P2P) is becoming a key technology for software development, but still lacks integrated solutions to build trust in the final software, in terms of correctness and...
Eduardo Cunha de Almeida, Gerson Sunyé, Yve...
CODES
2001
IEEE
13 years 11 months ago
A design framework to efficiently explore energy-delay tradeoffs
Comprehensive exploration of the design space parameters at the system-level is a crucial task to evaluate architectural tradeoffs accounting for both energy and performance const...
William Fornaciari, Donatella Sciuto, Cristina Sil...
EUROSEC
2008
ACM
13 years 9 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
EMSOFT
2008
Springer
13 years 9 months ago
Symbolic analysis for improving simulation coverage of Simulink/Stateflow models
Aimed at verifying safety properties and improving simulation coverage for hybrid systems models of embedded control software, we propose a technique that combines numerical simul...
Rajeev Alur, Aditya Kanade, S. Ramesh, K. C. Shash...
JCP
2007
94views more  JCP 2007»
13 years 7 months ago
Low-Complexity Analysis of Repetitive Regularities for Biometric Applications
— Presented in this paper is a joint algorithm optimization and architecture design framework for analysis of repetitive regularities. Two closely coupled algorithm optimization ...
Lei Wang, Niral Patel