Sciweavers

714 search results - page 126 / 143
» Verification and Compliance Testing
Sort
View
COMPSAC
2007
IEEE
14 years 16 days ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
DAC
2007
ACM
14 years 16 days ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
ICCS
2007
Springer
14 years 14 days ago
Efficient Measurement of the Eye Blinking by Using Decision Function for Intelligent Vehicles
In this paper, we propose an efficient measurement of the eye blinking for drowsy driver detection system that is one of the driver safety systems for the intelligent vehicle. Howe...
Ilkwon Park, Jung-Ho Ahn, Hyeran Byun
CC
2006
Springer
14 years 10 days ago
Interprocedural Dataflow Analysis in the Presence of Large Libraries
Interprocedural dataflow analysis has a large number of uses for software optimization, maintenance, testing, and verification. For software built with reusable components, the tra...
Atanas Rountev, Scott Kagan, Thomas J. Marlowe
DSD
2004
IEEE
129views Hardware» more  DSD 2004»
14 years 10 days ago
Functional Validation of Programmable Architectures
Validation of programmable architectures, consisting of processor cores, coprocessors, and memory subsystems, is one of the major bottlenecks in current Systemon-Chip design metho...
Prabhat Mishra, Nikil D. Dutt