Sciweavers

15779 search results - page 2990 / 3156
» Change-oriented software engineering
Sort
View
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
14 years 3 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
EUROSYS
2010
ACM
14 years 3 months ago
NOVA: a microhypervisor-based secure virtualization architecture
The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve pl...
Udo Steinberg, Bernhard Kauer
EUROSYS
2010
ACM
14 years 3 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
MSR
2010
ACM
14 years 3 months ago
Should I contribute to this discussion?
Abstract—Development mailing lists play a central role in facilitating communication in open source projects. Since these lists frequently host design and project discussions, kn...
Walid Ibrahim, Nicolas Bettenburg, Emad Shihab, Br...
MSR
2010
ACM
14 years 3 months ago
The Ultimate Debian Database: Consolidating bazaar metadata for Quality Assurance and data mining
—FLOSS distributions like RedHat and Ubuntu require a lot more complex infrastructures than most other FLOSS projects. In the case of community-driven distributions like Debian, ...
Lucas Nussbaum, Stefano Zacchiroli
« Prev « First page 2990 / 3156 Last » Next »