Sciweavers

4923 search results - page 773 / 985
» Software Risk Management
Sort
View
RAID
2010
Springer
13 years 7 months ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh
SOCO
2010
Springer
13 years 7 months ago
Visualizing and Assessing a Compositional Approach of Business Process Design
Abstract. In the context of Services Oriented Architecture (Soa), complex systems are realized through the design of business–driven processes. Since the design of a complete pro...
Sébastien Mosser, Alexandre Bergel, Mireill...
TOSEM
2010
159views more  TOSEM 2010»
13 years 7 months ago
Clone region descriptors: Representing and tracking duplication in source code
n the concept of abstract clone region descriptors (CRDs), which describe clone regions using a combination of their syntactic, structural, and lexical information. We present our ...
Ekwa Duala-Ekoko, Martin P. Robillard
AVI
2010
13 years 7 months ago
Seeing the self in the washing machine: the deep affordance of 2.0 philosophy in the household appliance domain
The acceleration of rhythm of everyday life requires efficiency and flexibility in daily routines. The real expectations and needs of people concerning intelligent home devices sh...
Caterina Calefato, Enrico Frumento, Monica Milani,...
CASES
2010
ACM
13 years 7 months ago
Improving the quality of ring oscillator PUFs on FPGAs
Physical Unclonable Functions (PUFs) based on Ring Oscillators (ROs) are a promising primitive for FPGA security. However, the quality of their implementation depends on several d...
Dominik Merli, Frederic Stumpf, Claudia Eckert