Sciweavers

410 search results - page 51 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
DEXA
2008
Springer
90views Database» more  DEXA 2008»
13 years 9 months ago
Knowledge Mining for the Business Analyst
There is an extensive literature on data mining techniques, including several applications of these techniques in the e-commerce setting. However, all previous approaches require t...
Themis Palpanas, Jakka Sairamesh
SERA
2010
Springer
13 years 6 months ago
A UML Based Deployment and Management Modeling for Cooperative and Distributed Applications
Thanks to the major evolutions in the communication technologies and in order to deal with a continuous increase in systems complexity, current applications have to cooperate to ac...
Mohammed Nadhmi Miladi, Fatma Krichen, Mohamed Jma...
CTRSA
2003
Springer
96views Cryptology» more  CTRSA 2003»
14 years 28 days ago
Hardware Performance Characterization of Block Cipher Structures
In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) ma...
Lu Xiao, Howard M. Heys
OOPSLA
2001
Springer
14 years 4 days ago
Regression Test Selection for Java Software
Regression testing is applied to modified software to provide confidence that the changed parts behave as intended and that the unchanged parts have not been adversely affected ...
Mary Jean Harrold, James A. Jones, Tongyu Li, Dong...
ICCS
2009
Springer
13 years 5 months ago
Dynamic Software Updates for Accelerating Scientific Discovery
Distributed parallel applications often run for hours or even days before arriving to a result. In the case of such long-running programs, the initial requirements could change aft...
Dong Kwan Kim, Myoungkyu Song, Eli Tilevich, Calvi...