Sciweavers

1855 search results - page 351 / 371
» System Consequence
Sort
View
UML
2004
Springer
14 years 3 months ago
Open Issues in Industrial Use Case Modeling
Use Cases have achieved wide use as a specification tool for observable behavior of systems. However, there is still much controversy, inconsistent use, and free-flowing interpreta...
Gonzalo Génova, Juan Llorens Morillo, Pierr...
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
14 years 3 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
14 years 3 months ago
A Single Buyer-Single Supplier Bargaining Problem with Asymmetric Information - Theoretical Approach and Software Implementation
This paper is focused on the coordination of order and production policy between buyers and suppliers in supply chains. When a buyer and a supplier of an item work independently, ...
Eric Sucky
SISW
2003
IEEE
14 years 3 months ago
Memories: A Survey of Their Secure Uses in Smart Cards
— Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (...
Michael Neve, Eric Peeters, David Samyde, Jean-Jac...
ICAIL
2003
ACM
14 years 3 months ago
Using Ontologies for Comparing and Harmonizing Legislation
In the last decades the interest in the problem of comparing and harmonizing legislation has been steadily increasing. One reason is the increasing legal convergence between gover...
Alexander Boer, Tom M. van Engers, Radboud Winkels