Sciweavers

1412 search results - page 61 / 283
» The Value of Outsourced Software
Sort
View
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
14 years 15 days ago
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
- Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their th...
Nachiketh R. Potlapally, Anand Raghunathan, Srivat...
KBSE
2010
IEEE
13 years 7 months ago
An automated approach for finding variable-constant pairing bugs
Named constants are used heavily in operating systems code, both as internal flags and in interactions with devices. Decision making within an operating system thus critically de...
Julia L. Lawall, David Lo
EVOW
2010
Springer
14 years 3 months ago
Parameter Tuning of Evolutionary Algorithms: Generalist vs. Specialist
Abstract. Finding appropriate parameter values for Evolutionary Algorithms (EAs) is one of the persistent challenges of Evolutionary Computing. In recent publications we showed how...
Selmar K. Smit, A. E. Eiben
FOSSACS
2012
Springer
12 years 4 months ago
Concurrent Games with Ordered Objectives
We consider concurrent games played on graphs, in which each player has several qualitative (e.g. reachability or B¨uchi) objectives, and a preorder on these objectives (for insta...
Patricia Bouyer, Romain Brenguier, Nicolas Markey,...
IEPOL
2002
51views more  IEPOL 2002»
13 years 8 months ago
The software industry and India's economic development
: This paper assesses the contribution of software to India's economic development paying particular attention to the role of the software in the absorption of labour and the ...
Ashish Arora, Suma Athreye