Sciweavers

127 search results - page 15 / 26
» Quantifying information leaks in software
Sort
View
SIGIR
2006
ACM
14 years 2 months ago
Statistical precision of information retrieval evaluation
We introduce and validate bootstrap techniques to compute confidence intervals that quantify the effect of test-collection variability on average precision (AP) and mean average...
Gordon V. Cormack, Thomas R. Lynam
HOST
2008
IEEE
14 years 3 months ago
Place-and-Route Impact on the Security of DPL Designs in FPGAs
—Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak po...
Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Dange...
CAV
2007
Springer
111views Hardware» more  CAV 2007»
14 years 17 days ago
Verification Across Intellectual Property Boundaries
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Sagar Chaki, Christian Schallhart, Helmut Veith
ISORC
2005
IEEE
14 years 2 months ago
An Automated Distributed Infrastructure for Collecting Bluetooth Field Failure Data
The widespread use of mobile and wireless computing platforms is leading to a growing interest on dependability issues. Several research studies have been conducted on dependabili...
Marcello Cinque, Fabio Cornevilli, Domenico Cotron...
NIPS
2007
13 years 10 months ago
Mining Internet-Scale Software Repositories
Large repositories of source code create new challenges and opportunities for statistical machine learning. Here we first develop Sourcerer, an infrastructure for the automated c...
Erik Linstead, Paul Rigor, Sushil Krishna Bajracha...