Sciweavers

12333 search results - page 2270 / 2467
» System Level Modelling for Hardware Software Systems
Sort
View
CSFW
2006
IEEE
15 years 8 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
108
Voted
IEEECIT
2006
IEEE
15 years 8 months ago
Integrating Configuration Management and Process Management Based on Life Cycle Control
Currently Configuration Management (CM) tool and Process Management (PM) tool are both largely applied in software organizations. However, neither of them can effectively support ...
Xin Peng, Wenyun Zhao, Chongxiang Zhu
103
Voted
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 8 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
ISPASS
2005
IEEE
15 years 8 months ago
Simulation Differences Between Academia and Industry: A Branch Prediction Case Study
Computer architecture research in academia and industry is heavily reliant on simulation studies. While microprocessor companies have the resources to develop highly detailed simu...
Gabriel H. Loh
SEFM
2005
IEEE
15 years 8 months ago
On Compatibility and Behavioural Substitutability of Component Protocols
Component Based Development (CBD) aims to facilitate the construction of large-scale applications by supporting the composition of simple building blocks into complex applications...
Nabil Hameurlain
« Prev « First page 2270 / 2467 Last » Next »