Sciweavers

601 search results - page 59 / 121
» Argumentation support: from technologies to tools
Sort
View
WIMOB
2008
IEEE
15 years 6 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao
HPCA
2005
IEEE
16 years 6 days ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
DATE
2009
IEEE
111views Hardware» more  DATE 2009»
15 years 6 months ago
Enabling concurrent clock and power gating in an industrial design flow
— Clock-gating and power-gating have proven to be very effective solutions for reducing dynamic and static power, respectively. The two techniques may be coupled in such a way th...
Leticia Maria Veiras Bolzani, Andrea Calimera, Alb...
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
15 years 5 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
EPEW
2005
Springer
15 years 5 months ago
Choreographing Security and Performance Analysis for Web Services
We describe a UML-based method which supports model-driven development of service-oriented architectures including those used in Web services. Analysable content is extracted from ...
Stephen Gilmore, Valentin Haenel, Leïla Kloul...