Sciweavers

1795 search results - page 323 / 359
» Security Models and Information Flow
Sort
View
146
Voted
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
15 years 1 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
124
Voted
CHI
2007
ACM
16 years 3 months ago
A study of out-of-turn interaction in menu-based, IVR, voicemail systems
We present the first user study of out-of-turn interaction in menu-based, interactive voice-response systems. Out-ofturn interaction is a technique which empowers the user (unable...
Saverio Perugini, Taylor J. Anderson, William F. M...
135
Voted
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
15 years 10 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
JOCN
2010
123views more  JOCN 2010»
14 years 10 months ago
Human Brain Dynamics Accompanying Use of Egocentric and Allocentric Reference Frames during Navigation
Maintaining spatial orientation while travelling requires integrating spatial information encountered from an egocentric viewpoint with accumulated information represented within ...
Klaus Gramann, Julie Onton, Davide Riccobon, Herma...
153
Voted
HPDC
2010
IEEE
15 years 4 months ago
Data parallelism in bioinformatics workflows using Hydra
Large scale bioinformatics experiments are usually composed by a set of data flows generated by a chain of activities (programs or services) that may be modeled as scientific work...
Fábio Coutinho, Eduardo S. Ogasawara, Danie...