Sciweavers

568 search results - page 85 / 114
» Enforcing traceability in software
Sort
View
CSREASAM
2004
13 years 11 months ago
A Unified Framework for Mobile Device Security
: Present-day handheld devices, such as PDAs, are a useful blend of hardware and software oriented toward the mobile workforce. While they provide the capability to review document...
Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev
ODRL
2004
13 years 11 months ago
A Pervasive Application Rights Management Architecture (PARMA) based on ODRL
Software license management is currently expanding from its traditional desktop environment into the mobile application space, but software vendors are still applying old licensing...
Dominik Dahlem, Ivana Dusparic, Jim Dowling
ISLPED
2010
ACM
169views Hardware» more  ISLPED 2010»
13 years 10 months ago
TurboTag: lookup filtering to reduce coherence directory power
On-chip coherence directories of today's multi-core systems are not energy efficient. Coherence directories dissipate a significant fraction of their power on unnecessary loo...
Pejman Lotfi-Kamran, Michael Ferdman, Daniel Crisa...
CORR
2008
Springer
110views Education» more  CORR 2008»
13 years 10 months ago
Audit and Change Analysis of Spreadsheets
Because spreadsheets have a large and growing importance in real-world work, their contents need to be controlled and validated. Generally spreadsheets have been difficult to veri...
John C. Nash, Neil Smith, Andy Adler
IANDC
2008
128views more  IANDC 2008»
13 years 10 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...