Sciweavers

1352 search results - page 162 / 271
» Designing Security Requirements Models Through Planning
Sort
View
TRUST
2010
Springer
14 years 3 months ago
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the devic...
Ernie Brickell, Jiangtao Li
ICCAD
2003
IEEE
145views Hardware» more  ICCAD 2003»
14 years 7 months ago
Manufacturing-Aware Physical Design
Ultra-deep submicron manufacturability impacts physical design (PD) through complex layout rules and large guardbands for process variability; this creates new requirements for ne...
Puneet Gupta, Andrew B. Kahng
IDMS
1997
Springer
182views Multimedia» more  IDMS 1997»
14 years 2 months ago
mTunnel: A Multicast Tunneling System with a User Based Quality-of-Service Model
Abstract. This paper presents a system, called mTunnel, for application level tunneling of multicast trac in a lightweight manner, where the end-user is responsible for deciding w...
Peter Parnes, Kåre Synnes, Dick Schefstr&oum...
UPP
2004
Springer
14 years 3 months ago
Design, Simulation, and Experimental Demonstration of Self-assembled DNA Nanostructures and Motors
Self-assembly is the spontaneous self-ordering of substructures into superstructures driven by the selective affinity of the substructures. DNA provides a molecular scale material...
John H. Reif, Thomas H. LaBean, Sudheer Sahu, Hao ...
SIGMETRICS
1998
ACM
187views Hardware» more  SIGMETRICS 1998»
14 years 2 months ago
An Analytic Behavior Model for Disk Drives with Readahead Caches and Request Reordering
Modern disk drives read-ahead data and reorder incoming requests in a workload-dependent fashion. This improves their performance, but makes simple analytical models of them inade...
Elizabeth A. M. Shriver, Arif Merchant, John Wilke...