Sciweavers

2034 search results - page 292 / 407
» On the Comparability of Software Clustering Algorithms
Sort
View
CODES
2007
IEEE
14 years 2 months ago
A smart random code injection to mask power analysis based side channel attacks
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...
GECCO
2007
Springer
198views Optimization» more  GECCO 2007»
14 years 2 months ago
On the design of optimisers for surface reconstruction
In many industrial applications the need for an efficient and high-quality reconstruction of free-form surfaces does exist. Surface Reconstruction – the generation of CAD models...
Tobias Wagner, Thomas Michelitsch, Alexei Sacharow
ICSM
2002
IEEE
14 years 1 months ago
Constructing Precise Object Relation Diagrams
The Object Relation Diagram (ORD) of a program is a class interdependence diagram which has applications in a wide variety of software engineering problems (e.g., integration test...
Ana Milanova, Atanas Rountev, Barbara G. Ryder
WCNC
2010
IEEE
13 years 12 months ago
Cross Layer Implementation of a Multi-User MIMO Test-Bed
Abstract—This paper describes an implementation of a realtime multi-user multiple-input multiple-output (MU-MIMO) communication system, with cross-layer channel-aware scheduling....
Niklas Jalden, Svante Bergman, Per Zetterberg, Bj&...
AIPS
2003
13 years 9 months ago
Localizing Planning with Functional Process Models
In this paper we describe a compromise between generative planning and special-purpose software. Hierarchical functional models are used by an intelligent system to represent its ...
J. William Murdock, Ashok K. Goel