Sciweavers

3256 search results - page 511 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
DRM
2006
Springer
15 years 1 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
NJC
2000
169views more  NJC 2000»
14 years 9 months ago
A Type System for Bounded Space and Functional In-Place Update
We show how linear typing can be used to obtain functional programs which modify heap-allocated data structures in place. We present this both as a "design pattern" for ...
Martin Hofmann
CASES
2003
ACM
15 years 3 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
RTCSA
2006
IEEE
15 years 4 months ago
Integrating Compiler and System Toolkit Flow for Embedded VLIW DSP Processors
To support high-performance and low-power for multimedia applications and for hand-held devices, embedded VLIW DSP processors are of research focus. With the tight resource constr...
Chi Wu, Kun-Yuan Hsieh, Yung-Chia Lin, Chung-Ju Wu...
BMCBI
2011
14 years 5 months ago
Dr. PIAS: an integrative system for assessing the druggability of protein-protein interactions
Background: The amount of data on protein-protein interactions (PPIs) available in public databases and in the literature has rapidly expanded in recent years. PPI data can provid...
Nobuyoshi Sugaya, Toshio Furuya