Sciweavers

589 search results - page 82 / 118
» Design and Implementation of an SSL Component Based on CBD
Sort
View
TCS
2010
14 years 10 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
VEE
2009
ACM
613views Virtualization» more  VEE 2009»
15 years 6 months ago
BitVisor: a thin hypervisor for enforcing i/o device security
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous compon...
Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimot...
CASES
2005
ACM
15 years 1 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
SEMWEB
2009
Springer
15 years 6 months ago
Results of GeRoMeSuite for OAEI 2009
GeRoMeSuite is a generic model management system which provides several functions for managing complex data models, such as schema integration, definition and execution of schema ...
Christoph Quix, Sandra Geisler, David Kensche, Xia...
AMAI
2004
Springer
15 years 5 months ago
Improving Exact Algorithms for MAX-2-SAT
We study three new techniques which will speed up the branch-and-bound algorithm for the MAX-2-SAT problem: The first technique is a new lower bound function for the algorithm an...
Haiou Shen, Hantao Zhang