Sciweavers

12637 search results - page 182 / 2528
» Security for Extensible Systems
Sort
View
ICSOC
2009
Springer
14 years 1 months ago
End-to-End Security for Enterprise Mashups
Abstract. Mashups are gaining momentum as a means to develop situational Web applications by combining different resources (services, data feeds) and user interfaces. In enterpris...
Florian Rosenberg, Rania Khalaf, Matthew J. Duftle...
COMCOM
2008
87views more  COMCOM 2008»
13 years 9 months ago
Providing VANET security through active position detection
Vehicle position is one of the most valuable pieces of information in a Vehicular Adhoc NETwork (VANET). The main contribution of this work is a novel approach to enhancing positi...
Gongjun Yan, Stephan Olariu, Michele C. Weigle
MICRO
2002
IEEE
97views Hardware» more  MICRO 2002»
14 years 2 months ago
Three extensions to register integration
Register integration (or just integration) is a register renaming discipline that implements instruction reuse via physical register sharing. Initially developed to perform squash...
Vlad Petric, Anne Bracy, Amir Roth
BMCBI
2005
73views more  BMCBI 2005»
13 years 9 months ago
An analysis of extensible modelling for functional genomics data
Background: Several data formats have been developed for large scale biological experiments, using a variety of methodologies. Most data formats contain a mechanism for allowing e...
Andrew R. Jones, Norman W. Paton
CASES
2006
ACM
14 years 3 months ago
Code transformation strategies for extensible embedded processors
Embedded application requirements, including high performance, low power consumption and fast time to market, are uncommon in the broader domain of general purpose applications. I...
Paolo Bonzini, Laura Pozzi