Sciweavers

1949 search results - page 3 / 390
» Protective Interface Specifications
Sort
View
BROADNETS
2004
IEEE
13 years 11 months ago
Benefits of Link Protection at Connection Granularity
This paper develops a connection establishment framework for protecting connections against single-link failures using link protection at the granularity of a connection, referred...
Karthikeyan Sathyamurthy, Srinivasan Ramasubramani...
COMPSEC
2008
116views more  COMPSEC 2008»
13 years 7 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...
PERCOM
2008
ACM
14 years 7 months ago
Protecting Users' Anonymity in Pervasive Computing Environments
The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfort...
Linda Pareschi, Daniele Riboni, Claudio Bettini
IFM
2000
Springer
13 years 11 months ago
ISpec: Towards Practical and Sound Interface Specifications
Abstract. This paper introduces the ISpec approach to interface specification. ISpec supports the development of interface specifications at various levels of formality and detail ...
H. B. M. Jonkers
SOSYM
2002
66views more  SOSYM 2002»
13 years 7 months ago
Consistent specification of interface suites in UML
Abstract. The paper motivates and describes a model oriented approach for consistent specification of interface suites in UML. An interface suite is a coherent collection of interf...
Ella E. Roubtsova, L. C. M. van Gool, Ruurd Kuiper...