Sciweavers

1660 search results - page 211 / 332
» Abstract Application Modeling for System Design Space Explor...
Sort
View
HIPEAC
2005
Springer
15 years 10 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
177
Voted
CCS
2011
ACM
14 years 4 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
156
Voted
GI
2005
Springer
15 years 10 months ago
A Normative Language Approach to the Application of Petri Nets for Clinical Workflows
: This contribution discusses the application of Petri nets for modeling workflow in healthcare based on a normative language approach. After a brief inon, a framework of different...
Kamyar Sarshar, Peter Loos
116
Voted
SIGCOMM
2010
ACM
15 years 4 months ago
Road traffic estimation using in-situ acoustic sensing
Abstract-- In this paper, we explore the efficacy of curbside acoustic sensing to estimate road traffic conditions. We formulated a set of hypotheses which attempted to correlate t...
C. Viven Rajendra, Purushottam Kulkarni
CHI
2010
ACM
15 years 11 months ago
Short and tweet: experiments on recommending content from information streams
More and more web users keep up with newest information through information streams such as the popular microblogging website Twitter. In this paper we studied content recommendat...
Jilin Chen, Rowan Nairn, Les Nelson, Michael Berns...