Sciweavers

1123 search results - page 151 / 225
» GUI Testing Techniques Evaluation by Designed Experiments
Sort
View
CCS
2010
ACM
15 years 1 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
SIGIR
2009
ACM
15 years 10 months ago
Web searching for daily living
The new concept proposed in this paper is a query free web search that automatically retrieves a web page including information related to the daily activity that we are currently...
Takuya Maekawa, Yutaka Yanagisawa, Yasushi Sakurai...
VLDB
1997
ACM
124views Database» more  VLDB 1997»
15 years 8 months ago
An Efficient Cost-Driven Index Selection Tool for Microsoft SQL Server
In this paper we describe novel techniques that make it possible to build an industrial-strength tool for automating the choice of indexes in the physical design of a SQL database...
Surajit Chaudhuri, Vivek R. Narasayya
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
15 years 9 months ago
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
Since their publication in 1998, power analysis attacks have attracted significant attention within the cryptographic community. So far, they have been successfully applied to di...
François-Xavier Standaert, Siddika Berna &O...
DAC
2005
ACM
15 years 5 months ago
Constraint-aware robustness insertion for optimal noise-tolerance enhancement in VLSI circuits
Reliability of nanometer circuits is becoming a major concern in today’s VLSI chip design due to interferences from multiple noise sources as well as radiation-induced soft erro...
Chong Zhao, Yi Zhao, Sujit Dey