Sciweavers

112 search results - page 21 / 23
» Information Flow Analysis of Android Applications in DroidSa...
Sort
View
DATE
2007
IEEE
145views Hardware» more  DATE 2007»
15 years 4 months ago
Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508
This paper proposes an innovative methodology to perform and validate a Failure Mode and Effects Analysis (FMEA) at System-on-Chip (SoC) level. This is done in compliance with the...
Riccardo Mariani, Gabriele Boschi, Federico Colucc...
HICSS
2003
IEEE
148views Biometrics» more  HICSS 2003»
15 years 3 months ago
Strategies for the Successful Implementation of Workflow Systems within Healthcare: A Cross Case Comparison
The implementation of computerized workflow systems to support the collection and dissemination of patient information has been an area of focus in healthcare for many years. This...
Meg Murray
CN
2006
117views more  CN 2006»
14 years 10 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance
MICRO
1998
IEEE
144views Hardware» more  MICRO 1998»
15 years 2 months ago
Analyzing the Working Set Characteristics of Branch Execution
To achieve highly accurate branch prediction, it is necessary not only to allocate more resources to branch prediction hardware but also to improve the understanding of branch exe...
Sangwook P. Kim, Gary S. Tyson
101
Voted
PKDD
1998
Springer
273views Data Mining» more  PKDD 1998»
15 years 2 months ago
TextVis: An Integrated Visual Environment for Text Mining
TextVis is a visual data mining system for document collections. Such a collection represents an application domain, and the primary goal of the system is to derive patterns that p...
David Landau, Ronen Feldman, Yonatan Aumann, Moshe...