Sciweavers

815 search results - page 112 / 163
» Using non-functional requirements to systematically support ...
Sort
View
STACS
1992
Springer
14 years 1 months ago
Secure Commitment Against A Powerful Adversary
abstract Rafail Ostrovskyy Ramarathnam Venkatesanz Moti Yungx Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. S...
Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yun...
ICSE
2003
IEEE-ACM
14 years 9 months ago
Beyond the Personal Software Process: Metrics collection and analysis for the differently disciplined
Pedagogies such as the Personal Software Process (PSP) shift metrics definition, collection, and analysis from the organizational level to the individual level. While case study r...
Philip M. Johnson, Hongbing Kou, Joy Agustin, Chri...
CSFW
2008
IEEE
14 years 3 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
ICDCS
2007
IEEE
14 years 3 months ago
Deploying Video-on-Demand Services on Cable Networks
— Efficient video-on-demand (VoD) is a highly desired service for media and telecom providers. VoD allows subscribers to view any item in a large media catalog nearly-instantane...
Matthew S. Allen, Ben Y. Zhao, Richard Wolski
ESAS
2005
Springer
14 years 2 months ago
Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...