Sciweavers

1763 search results - page 220 / 353
» Visualize and Open Up
Sort
View
NORDSEC
2009
Springer
14 years 2 months ago
Security Usability of Petname Systems
Abstract. To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to man...
Md. Sadek Ferdous, Audun Jøsang, Kuldeep Si...
DATE
2000
IEEE
88views Hardware» more  DATE 2000»
14 years 2 months ago
Free MDD-Based Software Optimization Techniques for Embedded Systems
Embedded systems make a heavy use of software to perform Real-Time embedded control tasks. Embedded software is characterized by a relatively long lifetime and by tight cost, perf...
Chunghee Kim, Luciano Lavagno, Alberto L. Sangiova...
ICRA
2000
IEEE
93views Robotics» more  ICRA 2000»
14 years 2 months ago
Scheduling and Coordination in Manufacturing Enterprise Automation
Manufacturing enterprise automation was focused on factory level where scheduling is a key issue in the past. As more and more companies are relying on their business parmers or s...
Haoxun Chen, Peter B. Luh
PLDI
2000
ACM
14 years 2 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps
DCC
1999
IEEE
14 years 2 months ago
Distributed Source Coding Using Syndromes (DISCUS): Design and Construction
We address the problem of distributed source coding, i.e. compression of correlated sources that are not co-located and/or cannot communicatewith each other to minimize their join...
S. Sandeep Pradhan, Kannan Ramchandran