Sciweavers

331 search results - page 37 / 67
» Software Protection Mechanisms for Dependable Systems
Sort
View
122
Voted
MOBISYS
2007
ACM
16 years 3 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
112
Voted
MICRO
2009
IEEE
120views Hardware» more  MICRO 2009»
15 years 10 months ago
Tribeca: design for PVT variations with local recovery and fine-grained adaptation
With continued advances in CMOS technology, parameter variations are emerging as a major design challenge. Irregularities during the fabrication of a microprocessor and variations...
Meeta Sharma Gupta, Jude A. Rivers, Pradip Bose, G...
MIDDLEWARE
2009
Springer
15 years 10 months ago
Why Do Upgrades Fail and What Can We Do about It?
Abstract. Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading ca...
Tudor Dumitras, Priya Narasimhan
130
Voted
MSWIM
2006
ACM
15 years 9 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
128
Voted
MDAFA
2004
Springer
135views Hardware» more  MDAFA 2004»
15 years 8 months ago
Developing a UML Profile for Modelling Knowledge-Based Systems
Knowledge engineers have favoured a diagrammatic approach for developing knowledge-based systems by adopting those used in software engineering. However, these modelling techniques...
Mohd Syazwan Abdullah, Chris Kimble, Richard F. Pa...