Sciweavers

SP
2008
IEEE
119views Security Privacy» more  SP 2008»
14 years 1 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
IRI
2008
IEEE
14 years 1 months ago
AMSQM: Adaptive multiple super-page queue management
Super-Pages have been wandering around for more than a decade. There are some particular operating systems that support Super-Paging and there are some recent research papers that...
Moshe Itshak, Yair Wiseman
ICONS
2008
IEEE
14 years 1 months ago
Using User Preferences to Enhance Privacy in Pervasive Systems
With the increasing interest in developing pervasive computing technologies there is growing recognition of the problems of maintaining user privacy. In the Daidalos pervasive sys...
Elizabeth Papadopoulou, Sarah McBurney, Nick K. Ta...
ICONS
2008
IEEE
14 years 1 months ago
A Systems Engineering Approach to Exception Handling
Missing or faulty exception handling has caused a number of spectacular system failures and is a major cause of software failures in extensively tested critical systems. Prior wor...
Herbert Hecht
ICONS
2008
IEEE
14 years 1 months ago
An Efficient Hardware Implementation of the Tate Pairing in Characteristic Three
DL systems with bilinear structure recently became an important base for cryptographic protocols such as identity-based encryption (IBE). Since the main computational task is the ...
Giray Kömürcü, Erkay Savas
ICONS
2008
IEEE
14 years 1 months ago
SOPC Co-design Platform for UWB System in Wireless Sensor Network Context
– This paper presents our approach of the radio interface problematic for Wireless Sensor Network. We introduce the WSN context and constraints associated. We propose an IR-UWB s...
Daniela Dragomirescu, Aubin Lecointre, Robert Plan...
ICONS
2008
IEEE
14 years 1 months ago
Analysis of Hybrid Systems Using HySAT
In this paper we describe the complete workflow of analyzing the dynamic behavior of safety-critical embedded systems with HySAT. HySAT is an arithmetic constraint solver with a ...
Christian Herde, Andreas Eggers, Martin Fränz...
ICONS
2008
IEEE
14 years 1 months ago
Dynamic Modeling and Control of Nonholonomic Mobile Robot with Lateral Slip
— Nonholonomic mobile robots are characterized by no-slip constraints. However, in many practical situations, slips are inevitable. In this work, we develop a theoretical and sys...
Naim Sidek, Nilanjan Sarkar
EDOC
2008
IEEE
14 years 1 months ago
EA4UP: An Enterprise Architecture-Assisted Telecom Service Development Method
The cost of a telecom service development is correlated to the discontinuity and the complexity of the process. To solve this problem, we propose a method dedicated to telecom ser...
Jacques Simonin, Francis Alizon, Jean-Pierre Desch...