Sciweavers

1168 search results - page 61 / 234
» Influencing Software Usage
Sort
View
ASPLOS
2006
ACM
14 years 3 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
CHI
2008
ACM
13 years 11 months ago
Cross-channel mobile social software: an empirical study
In this paper, we introduce a prototype system designed to support mobile group socializing that has been appropriated for everyday use by 150 users over 18 months. The system sup...
Clint Heyer, Margot Brereton, Stephen Viller
FPL
2005
Springer
89views Hardware» more  FPL 2005»
14 years 2 months ago
Snow 2.0 IP Core for Trusted Hardware
Stream ciphers are a promising technique for encryption in trusted hardware. ISO/IEC standardization is currently under way and SNOW 2.0 is one of the remaining candidates. Its sof...
Wenhai Fang, Thomas Johansson, Lambert Spaanenburg
RTCSA
2000
IEEE
14 years 1 months ago
Tracking Real-Time Systems Requirements
One of the hard problems in maintaining real-time systems requirements is to keep track of the impact of resource usage on the applications. Often times, it is not sufficient to ...
Aloysius K. Mok
LCN
2006
IEEE
14 years 3 months ago
Experimental investigation on VoIP performance and the resource utilization in 802.11b WLANs
In a shared medium network like the 802.11b WLAN, predicting the quality of VoIP calls from the resource usage of the wireless medium is highly desirable. Analyzing the bandwidth ...
Miroslaw Narbutt, Mark Davis