Sciweavers

124 search results - page 19 / 25
» A Module System for Isolating Untrusted Software Extensions
Sort
View
CISIS
2010
IEEE
15 years 4 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
FPL
2004
Springer
164views Hardware» more  FPL 2004»
15 years 1 months ago
Dynamic Prefetching in the Virtual Memory Window of Portable Reconfigurable Coprocessors
Abstract. In Reconfigurable Systems-On-Chip (RSoCs), operating systems can primarily (1) manage the sharing of limited reconfigurable resources, and (2) support communication betwe...
Miljan Vuletic, Laura Pozzi, Paolo Ienne
MSR
2006
ACM
15 years 3 months ago
The evolution radar: visualizing integrated logical coupling information
In software evolution research logical coupling has extensively been used to recover the hidden dependencies between source code artifacts. They would otherwise go lost because of...
Marco D'Ambros, Michele Lanza, Mircea Lungu
ICSM
2005
IEEE
15 years 3 months ago
Measurement and Quality in Object-Oriented Design
In order to support the maintenance of object-oriented software systems, the quality of their design must be evaluated using adequate quantification means. In spite of the curren...
Radu Marinescu
USS
2010
14 years 7 months ago
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...