Sciweavers

13913 search results - page 2480 / 2783
» models 2007
Sort
View
ESORICS
2007
Springer
15 years 11 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther
ESORICS
2007
Springer
15 years 11 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
ESTIMEDIA
2007
Springer
15 years 11 months ago
Network Calculus Applied to Verification of Memory Access Performance in SoCs
SoCs for multimedia applications typically use only one port to off-chip DRAM for cost reasons. The sharing of interconnect and the off-chip DRAM port by several IP blocks makes t...
Tomas Henriksson, Pieter van der Wolf, Axel Jantsc...
ESWS
2007
Springer
15 years 11 months ago
Semantic Process Retrieval with iSPARQL
Abstract. The vision of semantic business processes is to enable the integration and inter-operability of business processes across organizational boundaries. Since different orga...
Christoph Kiefer, Abraham Bernstein, Hong Joo Lee,...
EUC
2007
Springer
15 years 11 months ago
Consensus-Driven Distributable Thread Scheduling in Networked Embedded Systems
We demonstrate an improved consensus-driven utility accrual scheduling algorithm (DUA-CLA) for distributable threads which execute under run-time uncertainties in execution time, ...
Jonathan Stephen Anderson, Binoy Ravindran, E. Dou...
« Prev « First page 2480 / 2783 Last » Next »