Sciweavers

11603 search results - page 71 / 2321
» Securing Embedded Systems
Sort
View
108
Voted
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters
104
Voted
CSREAPSC
2006
15 years 3 months ago
A Real Time Scheduling Method for Embedded Multimedia Applications
Byoungchul Ahn, Ji-Hoon Kim, Dong Ha Lee, Sang Hoo...
92
Voted
JTRES
2009
ACM
15 years 8 months ago
CDx: a family of real-time Java benchmarks
Tomás Kalibera, Jeff Hagelberg, Filip Pizlo...
WORDS
2005
IEEE
15 years 7 months ago
Empirical Assessment of Machine Learning based Software Defect Prediction Techniques
Venkata U. B. Challagulla, Farokh B. Bastani, I-Li...