Sciweavers

127 search results - page 25 / 26
» Key Management in an Encrypting File System
Sort
View
IASTEDSE
2004
13 years 6 months ago
A symbolic Java virtual machine for test case generation
Quality management is becoming a more and more important part of the software development process. As software testing is currently understood as the core function of the quality ...
Roger A. Müller, Christoph Lembeck, Herbert K...
BMCBI
2007
112views more  BMCBI 2007»
13 years 5 months ago
Integrated olfactory receptor and microarray gene expression databases
Background: Gene expression patterns of olfactory receptors (ORs) are an important component of the signal encoding mechanism in the olfactory system since they determine the inte...
Nian Liu, Chiquito J. Crasto, Minghong Ma
WWW
2005
ACM
14 years 6 months ago
Web-assisted annotation, semantic indexing and search of television and radio news
The Rich News system, that can automatically annotate radio and television news with the aid of resources retrieved from the World Wide Web, is described. Automatic speech recogni...
Mike Dowman, Valentin Tablan, Hamish Cunningham, B...
IEEEPACT
2006
IEEE
13 years 11 months ago
A low-cost memory remapping scheme for address bus protection
The address sequence on the processor-memory bus can reveal abundant information about the control flow of a program. This can lead to critical information leakage such as encryp...
Lan Gao, Jun Yang 0002, Marek Chrobak, Youtao Zhan...
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
13 years 11 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic