Sciweavers

1177 search results - page 158 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
DOA
2000
159views more  DOA 2000»
15 years 1 months ago
Mobile Code as an Enabling Technology for Service-Oriented Smartcard Middleware
Smartcards can be seen as service providing entities that implement a secure, tamper-proof storage and offer computational resources which make them ideally suited for a variety o...
Roger Kehr, Michael Rohs, Harald Vogt
DAC
2006
ACM
15 years 6 months ago
The zen of nonvolatile memories
Silicon technology based nonvolatile memories (NVM) have achieved widespread adoption for code and data storage applications. In the last 30 years, the traditional floating gate ...
Erwin J. Prinz
AEI
2006
101views more  AEI 2006»
15 years 20 days ago
Design issues for assistive robotics for the elderly
The worldwide population of elderly people is growing rapidly and in the coming decades the proportion of older people in the developed countries will change significantly. This d...
Qinggang Meng, Mark H. Lee
83
Voted
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 7 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
140
Voted
MOBISYS
2006
ACM
16 years 5 days ago
Pegboard: a framework for developing mobile applications
Tool support for mobile application development can significantly improve programmer productivity and software quality. Pegboard is a novel tooling framework that extends the Ecli...
Danny Soroker, Ramón Cáceres, Danny ...