Sciweavers

3667 search results - page 54 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
BMCBI
2007
137views more  BMCBI 2007»
13 years 7 months ago
GEVALT: An integrated software tool for genotype analysis
Background: Genotype information generated by individual and international efforts carries the promise of revolutionizing disease studies and the association of phenotypes with al...
Ofir Davidovich, Gad Kimmel, Ron Shamir
IH
2004
Springer
14 years 1 months ago
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks
Abstract. This paper presents an implementation of the novel watermarking method proposed by Venkatesan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Sof...
Christian S. Collberg, Andrew Huntwork, Edward Car...
IWPC
2000
IEEE
14 years 5 hour ago
Automated Quality Analysis of Component Software for Embedded Systems
The Java programming language has gained increasing importance for the development of embedded systems. To be cost efficient, such systems have to cope with significant hardware...
Jens H. Jahnke, Jörg Niere, Jörg P. Wads...
DAC
2002
ACM
14 years 8 months ago
Timed compiled-code simulation of embedded software for performance analysis of SOC design
In this paper, a new timing generation method is proposed for the performance analysis of embedded software. The time stamp generation of I/O accesses is crucial to performance es...
Jong-Yeol Lee, In-Cheol Park
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
13 years 6 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar