Sciweavers

577 search results - page 52 / 116
» Engineering Sufficiently Secure Computing
Sort
View
111
Voted
CSE
2009
IEEE
15 years 9 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
124
Voted
CGO
2003
IEEE
15 years 6 months ago
Optimal and Efficient Speculation-Based Partial Redundancy Elimination
Existing profile-guided partial redundancy elimination (PRE) methods use speculation to enable the removal of partial redundancies along more frequently executed paths at the expe...
Qiong Cai, Jingling Xue
QSIC
2005
IEEE
15 years 8 months ago
Software Testing Education and Training in Hong Kong
While the use of computer applications is widely spread in every business and, hence, the reliability of software is critical, it is believed that many organizations involved in s...
F. T. Chan, W. H. Tang, T. Y. Chen
110
Voted
SIGSOFT
2010
ACM
15 years 15 days ago
Realizability analysis for message-based interactions using shared-state projections
The global interaction behavior in message-based systems can be specified as a finite-state machine defining acceptable sequences of messages exchanged by a group of peers. Realiz...
Sylvain Hallé, Tevfik Bultan
92
Voted
DAC
2008
ACM
16 years 3 months ago
Bounded-lifetime integrated circuits
Integrated circuits with bounded lifetimes can have many business advantages. We give some simple examples of m ods to enforce tunable expiration dates for chips using nanom reliab...
Puneet Gupta, Andrew B. Kahng