Sciweavers

3516 search results - page 252 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
CASES
2001
ACM
15 years 7 months ago
The emerging power crisis in embedded processors: what can a poor compiler do?
It is widely acknowledged that even as VLSI technology advances, there is a looming crisis that is an important obstacle to the widespread deployment of mobile embedded devices, n...
Lakshmi N. Chakrapani, Pinar Korkmaz, Vincent John...
CONTEXT
2007
Springer
15 years 10 months ago
CAMOU: A Simple Integrated eLearning and Planning Techniques Tool
In this paper we present an educational tool which has been designed to manage (learning) knowledge acquired from the interactions with the students, and to automatically aids educ...
David Camacho, María Dolores Rodrígu...
CCS
2003
ACM
15 years 9 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
WWW
2006
ACM
16 years 4 months ago
Toward tighter integration of web search with a geographic information system
Integration of Web search with geographic information has recently attracted much attention. There are a number of local Web search systems enabling users to find locationspecific...
Taro Tezuka, Takeshi Kurashima, Katsumi Tanaka
HPCA
2009
IEEE
16 years 4 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...