Sciweavers

615 search results - page 54 / 123
» Frameworks for Securing Limited-Device Applications
Sort
View
ECBS
2008
IEEE
113views Hardware» more  ECBS 2008»
13 years 8 months ago
Towards Secure Mobile Payment Based on SIP
Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile pa...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
CLUSTER
2006
IEEE
13 years 8 months ago
A flexible multi-dimensional QoS performance measure framework for distributed heterogeneous systems
When users' tasks in a distributed heterogeneous computing environment (e.g., cluster of heterogeneous computers) are allocated resources, the total demand placed on some sys...
Jong-Kook Kim, Debra A. Hensgen, Taylor Kidd, Howa...
CSFW
2006
IEEE
14 years 2 months ago
Encoding Information Flow in Haskell
This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful informa...
Peng Li, Steve Zdancewic
USENIX
2003
13 years 10 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
OOPSLA
2004
Springer
14 years 2 months ago
Bottleneck analysis in java applications using hardware performance monitors
This poster presents MonitorMethod which helps Java programmers gain insight in the behavior of their applications. MonitorMethod instruments the Java application and relates hard...
Dries Buytaert, Andy Georges, Lieven Eeckhout, Koe...