Sciweavers

698 search results - page 48 / 140
» Evaluating Key Statements Analysis
Sort
View
EIT
2008
IEEE
13 years 11 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
PLDI
2012
ACM
12 years 11 days ago
Sound and precise analysis of parallel programs through schedule specialization
Parallel programs are known to be difficult to analyze. A key reason is that they typically have an enormous number of execution interleavings, or schedules. Static analysis over...
Jingyue Wu, Yang Tang, Gang Hu, Heming Cui, Junfen...
SAC
2006
ACM
14 years 3 months ago
Towards value disclosure analysis in modeling general databases
The issue of confidentiality and privacy in general databases has become increasingly prominent in recent years. A key element in preserving privacy and confidentiality of sensi...
Xintao Wu, Songtao Guo, Yingjiu Li
TVCG
2010
168views more  TVCG 2010»
13 years 8 months ago
Principles and Tools for Collaborative Entity-Based Intelligence Analysis
—Software tools that make it easier for analysts to collaborate as a natural part of their work will lead to better analysis that is informed by more perspectives. We are interes...
Eric A. Bier, Stuart K. Card, John W. Bodnar
IQ
2007
13 years 11 months ago
Data Integration Schema Analysis: An Approach With Information Quality
: Integrated access to distributed data is an important problem faced in many scientific and commercial applications. A data integration system provides a unified view for users to...
Maria da Conceição Moraes Batista, A...