Sciweavers

1332 search results - page 131 / 267
» A generative programming approach to developing pervasive co...
Sort
View
153
Voted
CODES
2005
IEEE
15 years 8 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
157
Voted
CBSE
2011
Springer
14 years 2 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
ICS
2009
Tsinghua U.
15 years 7 months ago
A translation system for enabling data mining applications on GPUs
Modern GPUs offer much computing power at a very modest cost. Even though CUDA and other related recent developments are accelerating the use of GPUs for general purpose applicati...
Wenjing Ma, Gagan Agrawal
136
Voted
HUC
2004
Springer
15 years 8 months ago
CAMP: A Magnetic Poetry Interface for End-User Programming of Capture Applications for the Home
As the trend towards technology-enriched home environments progresses, the need to enable users to create applications to suit their own lives increases. While several recent proje...
Khai N. Truong, Elaine M. Huang, Gregory D. Abowd
123
Voted
ITNG
2008
IEEE
15 years 9 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson