Sciweavers

195 search results - page 33 / 39
» Fault Analysis of DPA-Resistant Algorithms
Sort
View
BIS
2007
124views Business» more  BIS 2007»
13 years 9 months ago
Evaluating Quality of Web Services: A Risk-Driven Approach
Abstract. Composing existing web services to obtain new functionalities is important for e-business applications. Deficiencies of aggregated web services can be compensated involv...
Natallia Kokash, Vincenzo D'Andrea
OOPSLA
2001
Springer
13 years 12 months ago
Regression Test Selection for Java Software
Regression testing is applied to modified software to provide confidence that the changed parts behave as intended and that the unchanged parts have not been adversely affected ...
Mary Jean Harrold, James A. Jones, Tongyu Li, Dong...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 7 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
ESORICS
2009
Springer
14 years 8 months ago
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Abstract. Diagnostic and classification algorithms play an important role in data analysis, with applications in areas such as health care, fault diagnostics, or benchmarking. Bran...
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov...
DATE
2006
IEEE
114views Hardware» more  DATE 2006»
14 years 1 months ago
A built-in redundancy-analysis scheme for RAMs with 2D redundancy using 1D local bitmap
Built-in self-repair (BISR) technique is gaining popular for repairing embedded memory cores in system-onchips (SOCs). To increase the utilization of memory redundancy, the BISR t...
Tsu-Wei Tseng, Jin-Fu Li, Da-Ming Chang