Sciweavers

4118 search results - page 51 / 824
» Mechanisms for usage control
Sort
View
ICDCS
2008
IEEE
15 years 10 months ago
Updates and Asynchronous Communication in Trusted Computing Systems
Software-based usage controls typically are vulnerable to attacks. Trusted Platform Modules (TPMs) can enable much more robust controls. However, as conventionally understood, TPM...
José Carlos Brustoloni, David Kyle
109
Voted
HICSS
2006
IEEE
140views Biometrics» more  HICSS 2006»
15 years 9 months ago
Controls in Flexible Software Development
Control and flexibility may appear an unlikely pair. However, we propose that effective flexible software development processes must still provide clear control mechanisms to mana...
Michael L. Harris, Alan R. Hevner, Rosann Webb Col...
COMSWARE
2007
IEEE
15 years 10 months ago
WiFiDump - A Novel Architecture for Wireless Network Debugging
— 802.11 usage has exploded and broken all barriers for which it was originally proposed. This has resulted in research for its non-legacy usages. Such usages require study of pa...
Abhijit Bagri, Mohit Mundhra, Abhinav Pathak, Bhas...
124
Voted
EUC
2006
Springer
15 years 7 months ago
Automatic Generation of Hardware/Software Interface with Product-Specific Debugging Tools
Software programmers want to manage pure software, not hardware-software entanglements. Unfortunately, traditional development methodologies cannot clearly separate hardware and so...
Jeong-Han Yun, Gunwoo Kim, Choonho Son, Taisook Ha...
160
Voted
WINET
2010
176views more  WINET 2010»
15 years 1 months ago
An improved mechanism for multiple MBMS sessions assignment in B3G cellular networks
In Universal Mobile Telecommunication System (UMTS), the downlink capacity is limited by the base station transmission power. Therefore, power control plays an important role to mi...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...