Sciweavers

67 search results - page 14 / 14
» A Survey of Practical Software Adaptation Techniques
Sort
View
JUCS
2008
161views more  JUCS 2008»
13 years 6 months ago
A Model-Driven Approach to Align Business Processes with User Interfaces
: Information Technology (IT) has evolved over time from its traditional use as administrative support towards a more strategic role to enforce business processes (BP). But several...
Kênia Soares Sousa, Hildeberto Mendonç...
IACR
2011
86views more  IACR 2011»
12 years 6 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf