Sciweavers

2310 search results - page 341 / 462
» Managing System and Active-Content Integrity
Sort
View
DAC
2007
ACM
14 years 9 months ago
Physical Unclonable Functions for Device Authentication and Secret Key Generation
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that...
G. Edward Suh, Srinivas Devadas
SIGSOFT
2008
ACM
14 years 8 months ago
On exceptions and the software development life cycle
ion that the system under development is looked at. We outline a mapping relating exceptions at a high level action to exceptions and other software artifacts at vels of abstractio...
Jörg Kienzle
SIGMOD
2007
ACM
108views Database» more  SIGMOD 2007»
14 years 8 months ago
Provenance in databases
The provenance of data has recently been recognized as central to the trust one places in data. It is also important to annotation, to data integration and to probabilistic databa...
Peter Buneman, Wang Chiew Tan
SIGMOD
2004
ACM
114views Database» more  SIGMOD 2004»
14 years 8 months ago
Evaluating lock-based protocols for cooperation on XML documents
We discuss four different core protocols for synchronizing access to and modifications of XML document collections. These core protocols synchronize structure traversals and modif...
Sven Helmer, Carl-Christian Kanne, Guido Moerkotte
ETFA
2008
IEEE
14 years 2 months ago
A secure agent platform for active RFID
RFID are used to identify products in factory automation applications; Multi agent systems are a possibility to introduce flexibility into production processes. This article intro...
Albert Treytl, Werner Spenger, Bilal Riaz