Sciweavers

6239 search results - page 1120 / 1248
» From Zinc to Design Model
Sort
View
116
Voted
CASES
2007
ACM
15 years 4 months ago
Rethinking custom ISE identification: a new processor-agnostic method
The last decade has witnessed the emergence of the Application Specific Instruction-set Processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user...
Ajay K. Verma, Philip Brisk, Paolo Ienne
109
Voted
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 4 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ICDE
2007
IEEE
170views Database» more  ICDE 2007»
15 years 4 months ago
A UML Profile for Core Components and their Transformation to XSD
In business-to-business e-commerce, traditional electronic data interchange (EDI) approaches such as UN/EDIFACT have been superseded by approaches like web services and ebXML. Nev...
Christian Huemer, Philipp Liegl
105
Voted
LISA
2007
15 years 3 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
MIE
2008
119views Healthcare» more  MIE 2008»
15 years 2 months ago
Systematizing medical alerts
The current Swedish regulations for medical alerts in health records were designed for paper records. Suggestions for computerized systems are now being investigated. A proposed mo...
Mattias Pettersson, Jenny Wihlborg, Rikard Lö...
« Prev « First page 1120 / 1248 Last » Next »