Sciweavers

17789 search results - page 27 / 3558
» Exceptional Use Cases
Sort
View
DELTA
2008
IEEE
13 years 9 months ago
On Using Fingerprint-Sensors for PIN-Pad Entry
Automatic fingerprint authentication is an integral part in many security systems. Because not every person is always suited to that technology, a general purpose security system ...
Marcel Jacomet, Josef Goette, Andreas Eicher
JSC
2006
147views more  JSC 2006»
13 years 7 months ago
An algorithm to solve integer linear systems exactly using numerical methods
In this paper, we present a new algorithm for the exact solutions of linear systems with integer coefficients using numerical methods. It terminates with the correct answer in wel...
Zhendong Wan
OOPSLA
2004
Springer
14 years 1 months ago
Finding and preventing run-time error handling mistakes
It is difficult to write programs that behave correctly in the presence of run-time errors. Existing programming language features often provide poor support for executing clean-u...
Westley Weimer, George C. Necula
CHES
2008
Springer
151views Cryptology» more  CHES 2008»
13 years 9 months ago
Binary Edwards Curves
Abstract. This paper presents a new shape for ordinary elliptic curves over fields of characteristic 2. Using the new shape, this paper presents the first complete addition formula...
Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Fa...
SEFM
2008
IEEE
14 years 2 months ago
Nullness Analysis in Boolean Form
Attempts to dereference null result in an exception or a segmentation fault. Hence it is important to know those program points where this might occur and prove the others (or the...
Fausto Spoto