Sciweavers

53390 search results - page 127 / 10678
» Computer Systems Analysis
Sort
View
ESORICS
1994
Springer
15 years 9 months ago
Liability and Computer Security: Nine Principles
The conventional wisdom is that security priorities should be set by risk analysis. However, reality is subtly different: many computer security systems are at least as much about ...
Ross J. Anderson
ALENEX
2004
110views Algorithms» more  ALENEX 2004»
15 years 6 months ago
Computation of a Class of COntinued Fraction Constants
There are numerous instances where mathematical constants do not admit a closed form. It is then of great interest to compute them, possibly in an efficient way. So the question i...
Loïck Lhote
ISORC
2007
IEEE
15 years 11 months ago
Security Analysis of the Utilization of Corba Object References as Authorization Tokens
In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Co...
Christoph Becker, Sebastian Staamann, Ralf Salomon
156
Voted
ECRTS
2006
IEEE
15 years 11 months ago
Optimal deadline assignment for periodic real-time tasks in dynamic priority systems
Real-time systems are often designed using a set of periodic tasks. Task periods are usually set by the system requirements, but deadlines and computation times can be modified i...
Patricia Balbastre, Ismael Ripoll, Alfons Crespo
129
Voted
CAIP
1999
Springer
121views Image Analysis» more  CAIP 1999»
15 years 9 months ago
Computing the Intrinsic Camera Parameters Using Pascal's Theorem
Bodo Rosenhahn, Eduardo Bayro-Corrochano
« Prev « First page 127 / 10678 Last » Next »