Sciweavers

699 search results - page 78 / 140
» Computation of Interprocedural Control Dependence
Sort
View
100
Voted
WPES
2003
ACM
15 years 5 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
96
Voted
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
15 years 4 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
83
Voted
BIOSYSTEMS
2008
84views more  BIOSYSTEMS 2008»
15 years 17 days ago
Decoding spike timing: The differential reverse-correlation method
It is widely acknowledged that detailed timing of action potentials is used to encode information, for example, in auditory pathways; however, the computational tools required to ...
Gasper Tkacik, Marcelo O. Magnasco
93
Voted
SEAA
2008
IEEE
15 years 6 months ago
VieCAR - Enabling Self-adaptive Collaboration Services
Novel forms of collaboration increasingly distribute control among e-workers, thereby allowing agile and autonomous collaboration. However, this requires a novel blend of infrastr...
Daniel Schall, Christoph Dorn, Schahram Dustdar, I...
90
Voted
DDECS
2007
IEEE
143views Hardware» more  DDECS 2007»
15 years 6 months ago
Fault Injection and Simulation for Fault Tolerant Reconfigurable Duplex System
– The implementation and the fault simulation technique for the highly reliable digital design using two FPGAs under a processor control is presented. Two FPGAs are used for dupl...
Pavel Kubalík, Jirí Kvasnicka, Hana ...