Sciweavers

1466 search results - page 293 / 294
» Completeness of the Authentication Tests
Sort
View
DAC
2011
ACM
12 years 6 months ago
DRAIN: distributed recovery architecture for inaccessible nodes in multi-core chips
As transistor dimensions continue to scale deep into the nanometer regime, silicon reliability is becoming a chief concern. At the same time, transistor counts are scaling up, ena...
Andrew DeOrio, Konstantinos Aisopos, Valeria Berta...
DAC
2011
ACM
12 years 6 months ago
Extracting behavior and dynamically generated hierarchy from SystemC models
SystemC is a popular modeling language which can be used to specify systems at bstraction level. Currently, SystemC tools can not cope with SystemC models for which the module hie...
Harry Broeders, René van Leuken
IACR
2011
86views more  IACR 2011»
12 years 5 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
ER
2007
Springer
237views Database» more  ER 2007»
14 years 13 days ago
Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis
Organizations are under increasing scrutiny to document their compliance to regulatory requirements. To this end, they have to formally document their operating procedures to supp...
Michael zur Muehlen, Marta Indulska, Gerrit Kamp
ISSTA
2012
ACM
11 years 8 months ago
A human study of patch maintainability
Identifying and fixing defects is a crucial and expensive part of the software lifecycle. Measuring the quality of bug-fixing patches is a difficult task that affects both func...
Zachary P. Fry, Bryan Landau, Westley Weimer