Sciweavers

1548 search results - page 264 / 310
» Estimating Software Vulnerabilities
Sort
View
HASE
2008
IEEE
15 years 5 months ago
Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems
With the increasing complexity in software and electronics in safety-critical systems new challenges to lower the costs and decrease time-to-market, while preserving high assuranc...
Jonas Elmqvist, Simin Nadjm-Tehrani
ICMCS
2008
IEEE
168views Multimedia» more  ICMCS 2008»
15 years 5 months ago
A co-design platform for algorithm/architecture design exploration
The efficient implementation of multimedia algorithms, for the ever increasing complexity of the specifications and the emergence of the new generation of processing platforms c...
Christophe Lucarz, Marco Mattavelli, Julien Dubois
ICONS
2008
IEEE
15 years 5 months ago
An Efficient Hardware Implementation of the Tate Pairing in Characteristic Three
DL systems with bilinear structure recently became an important base for cryptographic protocols such as identity-based encryption (IBE). Since the main computational task is the ...
Giray Kömürcü, Erkay Savas
CCGRID
2007
IEEE
15 years 5 months ago
Virtual Clusters on the Fly - Fast, Scalable, and Flexible Installation
One of the advantages in virtualized computing clusters compared to traditional shared HPC environments is their ability to accommodate user-specific system customization. Howeve...
Hideo Nishimura, Naoya Maruyama, Satoshi Matsuoka
ICCCN
2007
IEEE
15 years 5 months ago
Signaling Transport Options in GMPLS Networks: In-band or Out-of-band
—Signaling protocols for GMPLS networks have been standardized and implemented in switch controllers. Most switch vendors allow for signaling messages to be carried over inband s...
Malathi Veeraraghavan, Tao Li