Sciweavers

276 search results - page 52 / 56
» Software Security Checklist for the Software Life Cycle
Sort
View
114
Voted
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
15 years 6 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...
143
Voted
ARITH
2001
IEEE
15 years 7 months ago
Computer Arithmetic-A Processor Architect's Perspective
The Instruction Set Architecture (ISA) of a programmable processor is the native languageof the machine. It defines the set of operations and resourcesthat are optimized for that ...
Ruby B. Lee
135
Voted
ATAL
2004
Springer
15 years 9 months ago
Adaptive Information Infrastructures for the e-Society
Abstract. Positioned at the confluence between human/machine and hardware/software integration and backed by a solid proof of concept realized through several scenarios encompassin...
Mihaela Ulieru
224
Voted
SIGMOD
2006
ACM
208views Database» more  SIGMOD 2006»
16 years 3 months ago
Data management for a smart earth: the Swiss NCCR-MICS initiative
The Swiss National Competence Center for Research in mobile Information and Communication Systems (NCCR-MICS or MICS) is one of several research initiatives sponsored by the Swiss...
Karl Aberer, Gustavo Alonso, Donald Kossmann
ACMICEC
2005
ACM
175views ECommerce» more  ACMICEC 2005»
15 years 9 months ago
A theoretic discussion of tourism e-commerce
This paper presents the model of e-market structure and process analysis of tourism e-commerce. First the tourism e-commerce status quo is given clearly; secondly e-commerce and i...
Si-qing Liu