Sciweavers

1181 search results - page 62 / 237
» UMTS MPSoC design evaluation using a system level design fra...
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
TOMACS
1998
140views more  TOMACS 1998»
13 years 7 months ago
Technical Note: A Hierarchical Computer Architecture Design and Simulation Environment
architectures at multiple levels of abstraction, encompassing both hardware and software. It has five modes of operation (Design, Model Validation, Build Simulation, Simulate Syste...
Paul S. Coe, Fred W. Howell, Roland N. Ibbett, Lau...
RTAS
1998
IEEE
14 years 3 days ago
FARA - A Framework for Adaptive Resource Allocation in Complex Real-Time Systems
This paper introduces FARA, a framework that provides abstractions and mechanisms for building integrated adaptation and resource allocation services in complex real-time systems....
Daniela Rosu, Karsten Schwan, Sudhakar Yalamanchil...
ECIS
2003
13 years 9 months ago
Evaluating the effectiveness of learning interventions: an information systems case study
Currently, there is no standard instrument for evaluating learning effectiveness. While final examinations and end-of-semester course evaluation surveys can be used to do this, th...
Daniel L. Moody, Guttorm Sindre
ACSAC
2005
IEEE
14 years 1 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger