Sciweavers

1099 search results - page 9 / 220
» Evaluating Integration Architectures - A Scenario-Based Eval...
Sort
View
DAC
2010
ACM
14 years 1 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
ICNS
2007
IEEE
14 years 4 months ago
Data fusion algorithms for network anomaly detection: classification and evaluation
In this paper, the problem of discovering anomalies in a large-scale network based on the data fusion of heterogeneous monitors is considered. We present a classification of anoma...
Vasilis Chatzigiannakis, Georgios Androulidakis, K...
CORR
2008
Springer
137views Education» more  CORR 2008»
13 years 10 months ago
Evaluation of an Intelligent Assistive Technology for Voice Navigation of Spreadsheets
An integral part of spreadsheet auditing is navigation. For sufferers of Repetitive Strain Injury who need to use voice recognition technology this navigation can be highly proble...
Derek Flood, Kevin McDaid, Fergal McCaffery, Brian...
LAWEB
2004
IEEE
13 years 11 months ago
Integrating Semantic Concept Similarity in Model-Based Web Applications
Model-based design methods, and model-based architectures, have gained adoption in authoring applications for the WWW. This is further reinforced by the increasing visibility of t...
Cristiano Rocha, Daniel Schwabe, Marcus Poggi de A...
CAISE
2006
Springer
13 years 11 months ago
Incremental Evaluation of OCL Constraints
: Integrity checking is aimed at determining whether an operation execution violates a given integrity constraint. To perform this computation efficiently, several incremental meth...
Jordi Cabot, Ernest Teniente