Sciweavers

8874 search results - page 1671 / 1775
» A New Implementation of Automath
Sort
View
ISORC
2002
IEEE
15 years 8 months ago
Handling Aperiodic Tasks in Diverse Real-Time Systems via Plug-Ins
Functionality for various services of scheduling algorithms is typically provided as extensions to a basic algorithm. Aperiodic task handling, guarantees, etc., are integrated wit...
Tomas Lennvall, Gerhard Fohler, Björn Lindber...
151
Voted
SACMAT
2010
ACM
15 years 8 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
139
Voted
SIGMETRICS
2010
ACM
201views Hardware» more  SIGMETRICS 2010»
15 years 8 months ago
Transparent, lightweight application execution replay on commodity multiprocessor operating systems
We present S, the first system to provide transparent, lowoverhead application record-replay and the ability to go live from replayed execution. S i...
Oren Laadan, Nicolas Viennot, Jason Nieh
EUROCRYPT
2010
Springer
15 years 8 months ago
Algebraic Cryptanalysis of McEliece Variants with Compact Keys
In this paper we propose a new approach to investigate the security of the McEliece cryptosystem. We recall that this cryposystem relies on the use of error-correcting codes. Since...
Jean-Charles Faugère, Ayoub Otmani, Ludovic...
121
Voted
EUROCRYPT
2010
Springer
15 years 8 months ago
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tr...
« Prev « First page 1671 / 1775 Last » Next »