Sciweavers

2056 search results - page 297 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
CASES
2007
ACM
14 years 1 months ago
INTACTE: an interconnect area, delay, and energy estimation tool for microarchitectural explorations
Prior work on modeling interconnects has focused on optimizing the wire and repeater design for trading off energy and delay, and is largely based on low level circuit parameters....
Rahul Nagpal, Arvind Madan, Bharadwaj Amrutur, Y. ...
PRDC
2007
IEEE
14 years 3 months ago
Model Based Development of Safety-Critical Systems Using Template Based Code Generation
Model-based development is state of the art in software engineering, due to its potential regarding automatic code synthesis. Nevertheless for embedded systems, where there exists...
Matthias Regensburger, Christian Buckl, Alois Knol...
SOUPS
2005
ACM
14 years 2 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
AOSD
2006
ACM
14 years 3 months ago
Relationship aspects
The relationships between objects in object-oriented programs are as important as the objects themselves. Unfortunately, most objectoriented programming languages provide little s...
David J. Pearce, James Noble
CIDR
2007
106views Algorithms» more  CIDR 2007»
13 years 10 months ago
Isolation Support for Service-based Applications: A Position Paper
In this paper, we propose an approach that provides the benefits of isolation in service-oriented applications where it is not feasible to use the traditional locking mechanisms u...
Paul Greenfield, Alan Fekete, Julian Jang, Dean Ku...