Sciweavers

3895 search results - page 654 / 779
» Measuring the effectiveness of ACATS
Sort
View
ICSE
2008
IEEE-ACM
16 years 4 months ago
A value-based approach for documenting design decisions rationale: a replicated experiment
The explicit documentation of the rationale of design decisions is a practice generally encouraged but rarely implemented in industry because of a variety of inhibitors. Known met...
Davide Falessi, Rafael Capilla, Giovanni Cantone
ICFP
2002
ACM
16 years 4 months ago
An experimental study of renewal-older-first garbage collection
Generational collection has improved the efficiency of garbage collection in fast-allocating programs by focusing on collecting young garbage, but has done little to reduce the co...
Lars Thomas Hansen, William D. Clinger
117
Voted
ESORICS
2002
Springer
16 years 4 months ago
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
Marcin Gomulkiewicz, Miroslaw Kutylowski
PERCOM
2006
ACM
16 years 4 months ago
Criticality Aware Access Control Model for Pervasive Applications
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
MOBIHOC
2008
ACM
16 years 4 months ago
Towards energy efficient VoIP over wireless LANs
Wireless LAN (WLAN) radios conserve energy by staying in sleep mode. With real-time applications like VoIP, it is not clear how much energy can be saved by this approach since pac...
Vinod Namboodiri, Lixin Gao