Sciweavers

7080 search results - page 1187 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
145
Voted
PLDI
2006
ACM
15 years 9 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
146
Voted
TC
2011
14 years 10 months ago
StageNet: A Reconfigurable Fabric for Constructing Dependable CMPs
—CMOS scaling has long been a source of dramatic performance gains. However, semiconductor feature size reduction has resulted in increasing levels of operating temperatures and ...
Shantanu Gupta, Shuguang Feng, Amin Ansari, Scott ...
166
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
148
Voted
BMCBI
2002
136views more  BMCBI 2002»
15 years 3 months ago
Making sense of EST sequences by CLOBBing them
Background: Expressed sequence tags (ESTs) are single pass reads from randomly selected cDNA clones. They provide a highly cost-effective method to access and identify expressed g...
John Parkinson, David B. Guiliano, Mark L. Blaxter

Publication
819views
17 years 3 months ago
Continuous Query Processing of Spatio-temporal Data Streams in PLACE
The tremendous increase in the use of cellular phones, GPS-like devices, and RFIDs results in highly dynamic environments where objects as well as queries are continuously moving. ...
Mohamed F. Mokbel, Xiaopeng Xiong, Moustafa A. Ham...
« Prev « First page 1187 / 1416 Last » Next »