Sciweavers

3516 search results - page 569 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
OOPSLA
2005
Springer
15 years 9 months ago
DOSC: dispersed operating system computing
Over the past decade the sheer size and complexity of traditional operating systems have prompted a wave of new approaches to help alleviate the services provided by these operati...
Ramesh K. Karne, Karthick V. Jaganathan, Nelson Ro...
RTSS
1997
IEEE
15 years 7 months ago
On adaptive resource allocation for complex real-time application
Resource allocation for high-performance real-time applications is challenging due to the applications' data-dependent nature, dynamic changes in their external environment, ...
Daniela Rosu, Karsten Schwan, Sudhakar Yalamanchil...
ISI
2008
Springer
15 years 4 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
IS
2006
15 years 4 months ago
The MurMur project: Modeling and querying multi-representation spatio-temporal databases
Successful information management implies the ability to design accurate representations of the real world of interest, in spite of the diversity of perceptions from the applicati...
Christine Parent, Stefano Spaccapietra, Esteban Zi...
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy
We present the first universally verifiable voting scheme that can be based on a general assumption (existence of a non-interactive commitment scheme). Our scheme is also the first...
Tal Moran, Moni Naor