Sciweavers

1264 search results - page 121 / 253
» Designing Safe, Reliable Systems using Scade
Sort
View
SOQUA
2004
15 years 5 months ago
Measuring Component Performance Using A Systematic Approach and Environment
: As more third-party software components are available in the commercial market, more people begin to use the component-based software engineering approach to developing component...
Jerry Gao, Chandra S. Ravi, Raquel Espinoza
136
Voted
ICDCSW
2008
IEEE
15 years 11 months ago
Modeling Attack Behaviors in Rating Systems
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important problem and many unfair rat...
Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei D...
DATE
2008
IEEE
75views Hardware» more  DATE 2008»
15 years 11 months ago
Temperature Control of High-Performance Multi-core Platforms Using Convex Optimization
With technology advances, the number of cores integrated on a chip and their speed of operation is increasing. This, in turn is leading to a significant increase in chip temperat...
Srinivasan Murali, Almir Mutapcic, David Atienza, ...
CCS
2007
ACM
15 years 10 months ago
An independent audit framework for software dependent voting systems
The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. O...
Sujata Garera, Aviel D. Rubin
CCS
2007
ACM
15 years 10 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida