Sciweavers

2421 search results - page 327 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
165
Voted
IJBIS
2010
145views more  IJBIS 2010»
15 years 1 months ago
A multi-attribute group decision support system for information technology project selection
: The increasing intensity of global competition and the rapid advances in information technology (IT) have led organisations to search for more efficient and effective ways to man...
Faramak Zandi, Madjid Tavana
148
Voted
JCS
2010
80views more  JCS 2010»
14 years 11 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
137
Voted
DATE
2009
IEEE
159views Hardware» more  DATE 2009»
15 years 11 months ago
Design and implementation of a database filter for BLAST acceleration
— BLAST is a very popular Computational Biology algorithm. Since it is computationally expensive it is a natural target for acceleration research, and many reconfigurable archite...
Panagiotis Afratis, Constantinos Galanakis, Euripi...
CODES
2001
IEEE
15 years 8 months ago
Compiler-directed selection of dynamic memory layouts
Compiler technology is becoming a key component in the design of embedded systems, mostly due to increasing participation of software in the design process. Meeting system-level ob...
Mahmut T. Kandemir, Ismail Kadayif
158
Voted
SECON
2007
IEEE
15 years 11 months ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald