Sciweavers

1080 search results - page 80 / 216
» Improving Software Inspections by Using Reading Techniques
Sort
View
DRMTICS
2005
Springer
14 years 2 months ago
Algorithms to Watermark Software Through Register Allocation
Software security is a significant issue in the Internet age. In order to prevent software from piracy and unauthorized modification, many techniques have been developed. Softwar...
William Zhu, Clark D. Thomborson
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
14 years 9 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
ACMSE
2004
ACM
14 years 2 months ago
A model-driven approach for generating embedded robot navigation control software
Real-time embedded systems are time-critical systems that are hard to implement as compared to traditional commercial software, due to the large number of conflicting requirements...
Bina Shah, Rachael Dennison, Jeff Gray
VDA
2010
200views Visualization» more  VDA 2010»
13 years 11 months ago
Operator-centric design patterns for information visualization software
Design patterns have proven to be a useful means to make the process of designing, developing, and reusing software systems more efficient. In the area of information visualizatio...
Zaixian Xie, Zhenyu Guo, Matthew O. Ward, Elke A. ...
SIGIR
2009
ACM
14 years 3 months ago
Has adhoc retrieval improved since 1994?
Evaluation forums such as TREC allow systematic measurement and comparison of information retrieval techniques. The goal is consistent improvement, based on reliable comparison of...
Timothy G. Armstrong, Alistair Moffat, William Web...