Sciweavers

1564 search results - page 274 / 313
» The STEP Modular Architecture
Sort
View
WSC
2008
13 years 11 months ago
Lean engineering for planning systems redesign - staff participation by simulation
Lean manufacturing aims at flexible and efficient manufacturing systems by reducing waste in all forms, such as, production of defective parts, excess inventory, unnecessary proce...
Durk-Jouke van der Zee, Arnout Pool, Jakob Wijngaa...
ASPLOS
2008
ACM
13 years 10 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
COMPSAC
2008
IEEE
13 years 10 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma
ECAIW
2008
Springer
13 years 10 months ago
Home Care Personalisation with Individual Intervention Plans
The adoption of general intervention plans (guidelines) according to the particular circumstances of both the patient and the doctor's diagnostic is a very challenging task. A...
David Isern, Antonio Moreno, Gianfranco Pedone, Da...
ESORICS
2008
Springer
13 years 10 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...