Sciweavers

4923 search results - page 838 / 985
» Software Risk Management
Sort
View
UIST
2004
ACM
14 years 2 months ago
Interacting with hidden content using content-aware free-space transparency
We present content-aware free-space transparency, an approach to viewing and manipulating the otherwise hidden content of obscured windows through unimportant regions of overlappi...
Edward W. Ishak, Steven Feiner
ARCS
2004
Springer
14 years 2 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
EMISA
2004
Springer
14 years 2 months ago
A Virtual Laboratory for IT Security Education
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
Ji Hu, Dirk Cordel, Christoph Meinel
EMSOFT
2004
Springer
14 years 2 months ago
A typed assembly language for real-time programs
We present a type system for E code, which is an assembly language that manages the release, interaction, and termination of real-time tasks. E code specifies a deadline for each...
Thomas A. Henzinger, Christoph M. Kirsch
ICFEM
2004
Springer
14 years 2 months ago
Verifying a File System Implementation
Abstract. We present a correctness proof for a basic file system implementation. This implementation contains key elements of standard Unix file systems such as inodes and fixed...
Konstantine Arkoudas, Karen Zee, Viktor Kuncak, Ma...