Sciweavers

699 search results - page 78 / 140
» Computation of Interprocedural Control Dependence
Sort
View
WPES
2003
ACM
14 years 4 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
14 years 3 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
BIOSYSTEMS
2008
84views more  BIOSYSTEMS 2008»
13 years 11 months ago
Decoding spike timing: The differential reverse-correlation method
It is widely acknowledged that detailed timing of action potentials is used to encode information, for example, in auditory pathways; however, the computational tools required to ...
Gasper Tkacik, Marcelo O. Magnasco
SEAA
2008
IEEE
14 years 5 months ago
VieCAR - Enabling Self-adaptive Collaboration Services
Novel forms of collaboration increasingly distribute control among e-workers, thereby allowing agile and autonomous collaboration. However, this requires a novel blend of infrastr...
Daniel Schall, Christoph Dorn, Schahram Dustdar, I...
DDECS
2007
IEEE
143views Hardware» more  DDECS 2007»
14 years 5 months ago
Fault Injection and Simulation for Fault Tolerant Reconfigurable Duplex System
– The implementation and the fault simulation technique for the highly reliable digital design using two FPGAs under a processor control is presented. Two FPGAs are used for dupl...
Pavel Kubalík, Jirí Kvasnicka, Hana ...