Sciweavers

87 search results - page 8 / 18
» Measuring the interplay of security principles in software a...
Sort
View
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
13 years 10 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
CODES
1998
IEEE
14 years 21 days ago
The construction of a retargetable simulator for an architecture template
Systems in the domain of high-performance video signal processing are becoming more and more programmable. We suggest an approach to design such systems that involves measuring, v...
Bart Kienhuis, Ed F. Deprettere, Kees A. Vissers, ...
ICSE
1999
IEEE-ACM
14 years 21 days ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...
EUROMICRO
1997
IEEE
14 years 19 days ago
A RISC Microprocessor for Contactless Smart Cards
Two years ago [3] we began to study a R.I.S.C. approachfor smart card microprocessors. We reconsider this research to answer the question of the new technology of smart cards: the...
Christian Cormier, Georges Grimonprez
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
11 years 10 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...