Sciweavers

EUC
2008
Springer
13 years 6 months ago
Reducing Context Switch Overhead with Compiler-Assisted Threading
Multithreading is an important software modularization technique. However, it can incur substantial overheads, especially in processors where the amount of architecturally visible...
Pekka Jääskeläinen, Pertti Kellom&a...
EUC
2008
Springer
13 years 6 months ago
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation
The first challenge that we tackle in this paper is how to conduct access control in ubiquitous environments where sites have to handle access requests from their own users as wel...
Omar Hasan, Jean-Marc Pierson, Lionel Brunie
EUC
2008
Springer
13 years 6 months ago
Analyzing Privacy Designs of Mobile Social Networking Applications
The combined advances of open mobile platforms and online social networking applications (SNAs) are driving pervasive computing to the real-world users, as the mobile SNAs are exp...
Guanling Chen, Faruq Rahman
EUC
2008
Springer
13 years 6 months ago
Property Verification for Generic Access Control Models
Vincent C. Hu, D. Richard Kuhn, Tao Xie
EUC
2008
Springer
13 years 6 months ago
Data Mining for Security Applications
Bhavani M. Thuraisingham, Latifur Khan, Mohammad M...
EUC
2008
Springer
13 years 6 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
EUC
2008
Springer
13 years 6 months ago
Performance Comparison of Techniques on Static Path Analysis of WCET
Static path analysis is a key process of Worst Case Execution Time (WCET) estimation, the objective of which is to find the execution path that has the largest execution time. Cur...
Mingsong Lv, Zonghua Gu, Nan Guan, Qingxu Deng, Ge...
EUC
2008
Springer
13 years 6 months ago
Dynamic and Leakage Power Minimization with Loop Voltage Scheduling and Assignment
This paper studies the scheduling and assignment problem that minimizes the total energy including both dynamic and leakage energy for applications with loops on multi-voltage, mul...
Meikang Qiu, Jiande Wu, Jingtong Hu, Yi He, Edwin ...
EUC
2008
Springer
13 years 6 months ago
Human Universality in Ubiquitous Computing: Maslow, Where Are You?
Too narrow, the productivity-oriented vision guiding ubiquitous computing should be replaced or enriched with humanistic aspects. We discuss the role of Maslow's hierarchy of...
Sébastien Duval, Christian Hoareau, Hiromic...
EUC
2008
Springer
13 years 6 months ago
A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems
The kernel objects consist of critical kernel data structures and system call functions, which are the most important data for a system, should be protected as first-class candida...
Lei Sun, Tatsuo Nakajima