Sciweavers

392 search results - page 51 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
TRUST
2010
Springer
14 years 3 months ago
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the devic...
Ernie Brickell, Jiangtao Li
ISCAS
2005
IEEE
166views Hardware» more  ISCAS 2005»
14 years 4 months ago
Extending SystemC to support mixed discrete-continuous system modeling and simulation
—Systems on chip are more and more heterogeneous and include software, analog/RF and digital hardware, and non-electronic components such as sensors or actuators. The design and ...
Alain Vachoux, Christoph Grimm, Karsten Einwich
SEMWEB
2010
Springer
13 years 5 months ago
Theoretical foundations and engineering tools for building ontologies as reference conceptual models
Abstract. Perhaps the most fundamental notion underlying the desiderata for a successful Semantic Web is Semantic Interoperability. In this context, ontologies have been more and m...
Giancarlo Guizzardi
CCR
2006
112views more  CCR 2006»
13 years 10 months ago
The probe gap model can underestimate the available bandwidth of multihop paths
The Probe Gap Model (PGM) was proposed as a lightweight and fast available bandwidth estimation method. Measurement tools such as Delphi and Spruce are based on PGM. Compared to e...
Li Lao, Constantine Dovrolis, M. Y. Sanadidi
IWSEC
2007
Springer
14 years 4 months ago
Run-Time Randomization to Mitigate Tampering
The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tri...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...