Sciweavers

1080 search results - page 103 / 216
» Improving Software Inspections by Using Reading Techniques
Sort
View
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
13 years 9 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
CASES
2010
ACM
13 years 7 months ago
Balancing memory and performance through selective flushing of software code caches
Dynamic binary translators (DBTs) are becoming increasingly important because of their power and flexibility. However, the high memory demands of DBTs present an obstacle for all ...
Apala Guha, Kim M. Hazelwood, Mary Lou Soffa
ITNG
2010
IEEE
13 years 7 months ago
Towards Adaptive Replication Reconfiguration for QoS
— Replication is a technique widely used for large networked software systems to provide qualities such as reliability, availability, performance and scalability to their clients...
Raihan Al-Ekram, Richard C. Holt
NOMS
2002
IEEE
104views Communications» more  NOMS 2002»
14 years 2 months ago
Remote MIB-item look-up service
: Despite some deficiencies, the Internet management framework is widely deployed and thousands of Management Information Base (MIB) modules have been defined thus far. These modul...
Aiko Pras, Szabolcs Boros, Bert Helthuis
ISSA
2004
13 years 10 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White