Sciweavers

959 search results - page 127 / 192
» On the implementation of automatic differentiation tools
Sort
View
SADFE
2008
IEEE
15 years 10 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
15 years 10 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
146
Voted
WISE
2007
Springer
15 years 10 months ago
Goal-Based Visualization and Browsing for Semantic Web Services
Abstract. We present a goal-based approach for visualizing and browsing the search space of available Web services. A goal describes an obthat a client wants to solve by using Web ...
Michael Stollberg, Mick Kerrigan
160
Voted
FPL
2007
Springer
190views Hardware» more  FPL 2007»
15 years 10 months ago
The ANDRES Project: Analysis and Design of Run-Time Reconfigurable, Heterogeneous Systems
Today’s heterogeneous embedded systems combine components from different domains, such as software, analogue hardware and digital hardware. The design and implementation of thes...
Andreas Herrholz, Frank Oppenheimer, Philipp A. Ha...
IPOM
2007
Springer
15 years 10 months ago
QoE Monitoring Platform for Video Delivery Networks
This paper presents a full video delivery network monitoring suite. Our monitoring tool offers a new view of a video delivery network, a view based on the quality perceived by fi...
Daniel De Vera, Pablo Rodríguez-Bocca, Gera...