Sciweavers

4923 search results - page 862 / 985
» Software Risk Management
Sort
View
DSVIS
2008
Springer
13 years 10 months ago
Towards a Library of Workflow User Interface Patterns
Abstract. A collection of user interface design patterns for workflow information systems is presented. Each Workflow User Interface Pattern (WUIP) is characterized by properties e...
Josefina Guerrero García, Jean Vanderdonckt...
EIT
2008
IEEE
13 years 10 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
ESTIMEDIA
2008
Springer
13 years 10 months ago
A stochastic approach for fine grain QoS control
We present a method for fine grain QoS control of multimedia applications. This method takes as input an application software composed of actions parameterized by quality levels. ...
Jacques Combaz, Loïc Strus
FPL
2008
Springer
175views Hardware» more  FPL 2008»
13 years 10 months ago
File system access from reconfigurable FPGA hardware processes in BORPH
This paper presents the design and implementation of BORPH's kernel file system layer that provides FPGA processes direct access to the general file system. Using a semantics...
Hayden Kwok-Hay So, Robert W. Brodersen
INFOSCALE
2007
ACM
13 years 10 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü