Sciweavers

747 search results - page 68 / 150
» Testing for tunneling opens
Sort
View
ICSE
2010
IEEE-ACM
14 years 2 months ago
An eclectic approach for change impact analysis
Change impact analysis aims at identifying software artifacts being affected by a change. In the past, this problem has been addressed by approaches relying on static, dynamic, a...
Michele Ceccarelli, Luigi Cerulo, Gerardo Canfora,...
FDTC
2006
Springer
117views Cryptology» more  FDTC 2006»
14 years 1 months ago
DPA on Faulty Cryptographic Hardware and Countermeasures
Abstract. Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reli...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
ASM
2010
ASM
14 years 1 months ago
Starting B Specifications from Use Cases
The B method is one of the most used formal methods, when reactive systems is under question, due to good support for refinement. However, obtaining the formal model from requireme...
Thiago C. de Sousa, Aryldo G. Russo
BMCBI
2008
99views more  BMCBI 2008»
13 years 9 months ago
NestedMICA as an ab initio protein motif discovery tool
Background: Discovering overrepresented patterns in amino acid sequences is an important step in protein functional element identification. We adapted and extended NestedMICA, an ...
Mutlu Dogruel, Thomas A. Down, Tim J. P. Hubbard
CC
2007
Springer
158views System Software» more  CC 2007»
13 years 9 months ago
The Complexity of Membership Problems for Circuits Over Sets of Natural Numbers
Abstract. The problem of testing membership in the subset of the natural numbers produced at the output gate of a {∪, ∩,− , +, ×} combinational circuit is shown to capture a...
Pierre McKenzie, Klaus W. Wagner