Sciweavers

575 search results - page 26 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
IDTRUST
2010
ACM
14 years 2 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
DELTA
2006
IEEE
14 years 1 months ago
Static Code Analysis of Functional Descriptions in SystemC
The co-design of hardware and software systems with object oriented design languages like SystemC has become very popular. Static analysis of those descriptions allows to conduct ...
Martin Holzer 0002, Markus Rupp
COOPIS
1996
IEEE
13 years 12 months ago
A Methodology for Building a Data Warehouse in a Scientific Environment
Rational drug design is an example where integrated access to heterogeneous scientific data is urgently needed, as it becomes rapidly available due to new experimental and computa...
Karl Aberer, Klemens Hemm
MICRO
2003
IEEE
125views Hardware» more  MICRO 2003»
14 years 28 days ago
Runtime Power Monitoring in High-End Processors: Methodology and Empirical Data
With power dissipation becoming an increasingly vexing problem across many classes of computer systems, measuring power dissipation of real, running systems has become crucial for...
Canturk Isci, Margaret Martonosi
TRUST
2009
Springer
14 years 2 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...