Sciweavers

1022 search results - page 126 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
ECOOPW
1999
Springer
14 years 1 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad
DRM
2006
Springer
14 years 22 days ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
SSDBM
2006
IEEE
147views Database» more  SSDBM 2006»
14 years 3 months ago
Task-Oriented Integrated Use of Biological Web Data Sources
Biological web data sources have now become essential information sources for researchers. However, their use is tedious, labor-intensive, repetitive, and possibly involve the int...
Mustafa Kirac, Ali Cakmak, Gultekin Özsoyoglu
ICCSA
2005
Springer
14 years 2 months ago
Modelling of Process of Electronic Signature with Petri Nets and (Max, Plus) Algebra
This article discusses the modelling and the evaluation of process of electronic signature (ES). According to a certain point of view, this process can be shown as a class of Dynam...
Ahmed Nait-Sidi-Moh, Maxime Wack
TSE
2002
122views more  TSE 2002»
13 years 8 months ago
Virtual Benchmarking and Model Continuity in Prototyping Embedded Multiprocessor Signal Processing Systems
The complexity of hardware/software codesign of embedded real-time signal processing systems can be reduced by rapid system prototyping (RSP). However, existing RSP frameworks do n...
Randall S. Janka, Linda M. Wills, Lewis B. Baumsta...