Sciweavers

3357 search results - page 526 / 672
» Controlling Complexity
Sort
View
MMMACNS
2001
Springer
15 years 6 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
POLICY
2001
Springer
15 years 6 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
HICSS
2000
IEEE
101views Biometrics» more  HICSS 2000»
15 years 6 months ago
Strategic Management of IS/IT Functions: The Role of the CIO
Chief information officers (CIOs) have the difficult job of running a function that uses a lot of resources but offers little measurable evidence of its value. Line managers are i...
Petter Gottschalk, Nolan J. Taylor
118
Voted
HPCA
2000
IEEE
15 years 6 months ago
Design of a Parallel Vector Access Unit for SDRAM Memory Systems
We are attacking the memory bottleneck by building a “smart” memory controller that improves effective memory bandwidth, bus utilization, and cache efficiency by letting appl...
Binu K. Mathew, Sally A. McKee, John B. Carter, Al...
ISSRE
2000
IEEE
15 years 6 months ago
Module Size Distribution and Defect Density
Data from several projects show a significant relationship between the size of a module and its defect density. Here we address implications of this observation. Does the overall ...
Yashwant K. Malaiya, Jason Denton