Sciweavers

1412 search results - page 185 / 283
» The Value of Outsourced Software
Sort
View
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
13 years 11 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
CORR
2008
Springer
66views Education» more  CORR 2008»
13 years 10 months ago
A Novel Approach to Formulae Production and Overconfidence Measurement to Reduce Risk in Spreadsheet Modelling
Research on formulae production in spreadsheets has established the practice as high risk yet unrecognised as such by industry. There are numerous software applications that are d...
Simon R. Thorne, David Ball, Zoe Lawson
FIRSTMONDAY
2008
121views more  FIRSTMONDAY 2008»
13 years 10 months ago
Free and Open Source Licenses in Community Life: Two Empirical Cases
How do licenses participate in Free and Open Source Software (FLOSS) community life? This paper aims at answering this question. Despite the dynamic character of FLOSS development...
Stefano De Paoli, Maurizio Teli, Vincenzo D'Andrea
IANDC
2008
128views more  IANDC 2008»
13 years 10 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
SOCO
2008
Springer
13 years 10 months ago
Fuzzy linear regression model based on fuzzy scalar product
The new concept and method of imposing imprecise (fuzzy) input and output data upon the conventional linear regression model is proposed in this paper. We introduce the fuzzy scala...
Hsien-Chung Wu