Sciweavers

151 search results - page 17 / 31
» Considering Operational Security Risk during System Developm...
Sort
View
LISA
1994
13 years 10 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
13 years 7 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
14 years 4 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
14 years 6 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
JCIT
2008
150views more  JCIT 2008»
13 years 9 months ago
Affective Space Calibration in Action-rich Media Affective Systems
Affective computing systems are software systems that take in account the emotional state of the user during their operation. Recently it is increasingly accepted that combining e...
Anestis A. Toptsis, Alexander Dubitski