Sciweavers

191 search results - page 27 / 39
» Systematic Security Analysis for Service-Oriented Software A...
Sort
View
ICCD
2002
IEEE
141views Hardware» more  ICCD 2002»
14 years 4 months ago
Embedded Operating System Energy Analysis and Macro-Modeling
A large and increasing number of modern embedded systems are subject to tight power/energy constraints. It has been demonstrated that the operating system (OS) can have a signifi...
Tat Kee Tan, Anand Raghunathan, Niraj K. Jha
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
11 years 10 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
BMCBI
2007
152views more  BMCBI 2007»
13 years 7 months ago
PASSIM - an open source software system for managing information in biomedical studies
Background: One of the crucial aspects of day-to-day laboratory information management is collection, storage and retrieval of information about research subjects and biomedical s...
Juris Viksna, Edgars Celms, Martins Opmanis, Karli...
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
13 years 11 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
ESWS
2007
Springer
14 years 1 months ago
Empowering Software Maintainers with Semantic Web Technologies
Abstract. Software maintainers routinely have to deal with a multitude of artifacts, like source code or documents, which often end up disconnected, due to their different represen...
René Witte, Yonggang Zhang, Juergen Rilling