Sciweavers

905 search results - page 78 / 181
» The Case Against Micropayments
Sort
View
TSE
2008
92views more  TSE 2008»
13 years 7 months ago
Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems
Test adequacy criteria provide the engineer with guidance on how to populate test suites. While adequacy criteria have long been a focus of research, existing testing methods do no...
Matthew J. Rutherford, Antonio Carzaniga, Alexande...
CTW
2002
75views more  CTW 2002»
13 years 7 months ago
The Use of a Formalised Risk Model in NHS Information System Development
: Information Systems (IS) and technology are used extensively throughout the NHS, and the 1998 national information strategy, "Information for Health", sets out how the ...
M. A. Jeffcott, C. W. Johnson
EOR
2002
73views more  EOR 2002»
13 years 7 months ago
Stochastic conditional and unconditional warfare
This article constructs a foundation for warfare at the individual level, where agents in two groups fire and absorb shots according to a non-stationary Poisson process. We determ...
Kjell Hausken, John F. Moxnes
TNN
1998
96views more  TNN 1998»
13 years 7 months ago
Noise suppressing sensor encoding and neural signal orthonormalization
In this paper we regard first the situation where parallel channels are disturbed by noise. With the goal of maximal information conservation we deduce the conditions for a transf...
Rüdiger W. Brause, M. Rippl
CASES
2010
ACM
13 years 6 months ago
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as res...
Ambuj Sinha, Zhimin Chen, Patrick Schaumont