Sciweavers

15614 search results - page 3080 / 3123
» The State of State
Sort
View
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 6 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
TRIDENTCOM
2010
IEEE
13 years 6 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
WCET
2010
13 years 6 months ago
Bounding the Effects of Resource Access Protocols on Cache Behavior
The assumption of task independence has long been consubstantial with the formulation of many schedulability analysis techniques. That assumption is evidently advantageous for the...
Enrico Mezzetti, Marco Panunzio, Tullio Vardanega
CDC
2009
IEEE
170views Control Systems» more  CDC 2009»
13 years 6 months ago
ESMF based multiple UAVs active cooperative observation method in relative velocity coordinates
based on extended set-membership filter (ESMF) and the path planning method in relative velocity coordinates (RVCs), a new 3D multiple Unmanned Aerial Vehicle (UAV) systems active ...
Feng Gu, Yuqing He, Jianda Han, Yuechao Wang
COMPGEOM
2009
ACM
13 years 6 months ago
Geometric tomography: a limited-view approach for computed tomography
Computed tomography(CT), especially since the introduction of helical CT, provides excellent visualization of the internal organs of the body. As a result, CT is used routinely in...
Peter B. Noël, Jinhui Xu, Kenneth R. Hoffmann...
« Prev « First page 3080 / 3123 Last » Next »