Sciweavers

4917 search results - page 899 / 984
» Software Engineering is Not Computer Science
Sort
View
FOSSACS
2009
Springer
15 years 11 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
FOSSACS
2009
Springer
15 years 11 months ago
Bisimulation for Demonic Schedulers
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...
Konstantinos Chatzikokolakis, Gethin Norman, David...
SAMOS
2009
Springer
15 years 10 months ago
Runtime Adaptive Extensible Embedded Processors - A Survey
Current generation embedded applications demand the computation engine to offer high performance similar to custom hardware circuits while preserving the flexibility of software s...
Huynh Phung Huynh, Tulika Mitra
133
Voted
ISORC
2008
IEEE
15 years 10 months ago
Adaptive Fuzzy Control for Utilization Management
—An increasing number of real-time systems are embedded in mission critical systems such as target tracking systems, in which workloads may dynamically vary, for example, dependi...
Mehmet H. Suzer, Kyoung-Don Kang
COMSWARE
2007
IEEE
15 years 10 months ago
Scalable Multicast Platforms for a New Generation of Robust Distributed Applications
1 As distributed systems scale up and are deployed into increasingly sensitive settings, demand is rising for a new generation of communications middleware in support of applicati...
Ken Birman, Mahesh Balakrishnan, Danny Dolev, Tudo...