Sciweavers

634 search results - page 65 / 127
» Groundwork for Weak Analysis
Sort
View
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
15 years 8 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
166
Voted
WISA
2009
Springer
15 years 8 months ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar
114
Voted
CCA
2000
Springer
15 years 8 months ago
A Computable Spectral Theorem
Computing the spectral decomposition of a normal matrix is among the most frequent tasks to numerical mathematics. A vast range of methods are employed to do so, but all of them su...
Martin Ziegler, Vasco Brattka
120
Voted
KBSE
1999
IEEE
15 years 8 months ago
Automatically Structuring Textual Requirement Scenarios
Scenarios are valuable for supporting communication among system developers in the initial phases of requirements engineering. But the problem of how to fruitfully deal with large...
Andreas Becks, Jörg Köller
120
Voted
ARITH
1997
IEEE
15 years 8 months ago
SRT Division Architectures and Implementations
SRT dividers are common in modern floating point units. Higher division performance is achieved by retiring more quotient bits in each cycle. Previous research has shown that rea...
David L. Harris, Stuart F. Oberman, Mark Horowitz