Sciweavers

305 search results - page 51 / 61
» Experiences with Modeling and Verification of Regulations
Sort
View
NSDI
2008
13 years 10 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
IHI
2010
109views Healthcare» more  IHI 2010»
13 years 2 months ago
Process-based derivation of requirements for medical devices
One goal of medical device certification is to show that a given medical device satisfies its requirements. The requirements that should be met by a device, however, depend on the...
Heather M. Conboy, George S. Avrunin, Lori A. Clar...
MM
2003
ACM
161views Multimedia» more  MM 2003»
14 years 24 days ago
Integrated power management for video streaming to mobile handheld devices
Optimizing user experience for streaming video applications on handheld devices is a significant research challenge. In this paper, we propose an integrated power management appr...
Shivajit Mohapatra, Radu Cornea, Nikil D. Dutt, Al...
BMCBI
2005
141views more  BMCBI 2005»
13 years 7 months ago
Construction and validation of the APOCHIP, a spotted oligo-microarray for the study of beta-cell apoptosis
Background: Type 1 diabetes mellitus (T1DM) is a autoimmune disease caused by a long-term negative balance between immune-mediated beta-cell damage and beta-cell repair/regenerati...
Nils E. Magnusson, Alessandra K. Cardozo, Mogens K...
SIGSOFT
2008
ACM
14 years 8 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa