Sciweavers

191 search results - page 26 / 39
» Building Intrusion-Tolerant Secure Software
Sort
View
WISE
2003
Springer
14 years 1 months ago
Service-Oriented Computing: Concepts, Characteristics and Directions
Service-Oriented Computing (SOC) is the computing paradigm that utilizes services as fundamental elements for developing applications/solutions. To build the service model, SOC re...
Mike P. Papazoglou
ISW
2001
Springer
14 years 12 days ago
An Auditable Metering Scheme for Web Advertisement Applications
This paper proposes a cryptographic mechanism for metering the duration and/or the number of instances of running a data process. This mechanism has the following property: knowing...
Liqun Chen, Wenbo Mao
CAV
2007
Springer
212views Hardware» more  CAV 2007»
13 years 12 months ago
A Tutorial on Satisfiability Modulo Theories
Abstract. Solvers for satisfiability modulo theories (SMT) check the satisfiability of first-order formulas containing operations from various theories such as the Booleans, bit-ve...
Leonardo Mendonça de Moura, Bruno Dutertre,...
FPL
2004
Springer
143views Hardware» more  FPL 2004»
13 years 11 months ago
Exploring Area/Delay Tradeoffs in an AES FPGA Implementation
Abstract. Field-Programmable Gate Arrays (FPGAs) have lately become a popular target for implementing cryptographic block ciphers, as a well-designed FPGA solution can combine some...
Joseph Zambreno, David Nguyen, Alok N. Choudhary
ICSE
2005
IEEE-ACM
14 years 8 months ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu