Sciweavers

3792 search results - page 63 / 759
» Techniques for Trusted Software Engineering
Sort
View
AC
2005
Springer
13 years 10 months ago
Power Analysis and Optimization Techniques for Energy Efficient Computer Systems
Reducing power consumption has become a major challenge in the design and operation of today's computer systems. This chapter describes different techniques addressing this c...
Wissam Chedid, Chansu Yu, Ben Lee
SIGSOFT
2008
ACM
14 years 10 months ago
A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications
Framework-intensive applications (e.g., Web applications) heavily use temporary data structures, often resulting in performance bottlenecks. This paper presents an optimized blend...
Bruno Dufour, Barbara G. Ryder, Gary Sevitsky
ACSAC
2007
IEEE
14 years 4 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
ICDE
2006
IEEE
104views Database» more  ICDE 2006»
14 years 4 months ago
Trusted CVS
The CVS (Concurrent Versions System) software is a popular method for recording modifications to data objects, in addition to concurrent access to data in a multi-user environmen...
Muthuramakrishnan Venkitasubramaniam, Ashwin Macha...
HICSS
2008
IEEE
129views Biometrics» more  HICSS 2008»
14 years 4 months ago
Collaborative Continuous Service Engineering: A Case Study in a Financial Service Environment
We present a methodology to engineer services in real-time information environments. We evaluate, combine and enrich traditional techniques and methodologies such as New Product D...
Ryan Riordan, Benjamin Blau, Dirk Neumann, Christo...