Sciweavers

257 search results - page 52 / 52
» The S3 (Strategy-Service-Support) Framework for Business Pro...
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
13 years 11 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
GECCO
2004
Springer
179views Optimization» more  GECCO 2004»
13 years 10 months ago
An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System
Abstract. The need for supporting CSCW applications with heterogeneous and varying user requirements calls for adaptive and reconfigurable schedulers accommodating a mixture of re...
Horst Wedde, Muddassar Farooq, Mario Lischka