Sciweavers

23 search results - page 3 / 5
» It depends on what you mean by 'working'
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 1 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
JOT
2007
170views more  JOT 2007»
14 years 9 months ago
Enough of Processes - Lets do Practices
All modern software development processes try to help project teams conduct their work. While there are some important differences between them, the commonalities are far greater ...
Ivar Jacobson, Pan Wei Ng, Ian Spence
ISCA
2010
IEEE
176views Hardware» more  ISCA 2010»
15 years 2 months ago
Forwardflow: a scalable core for power-constrained CMPs
Chip Multiprocessors (CMPs) are now commodity hardware, but commoditization of parallel software remains elusive. In the near term, the current trend of increased coreper-socket c...
Dan Gibson, David A. Wood
CHI
2011
ACM
14 years 1 months ago
Knowing funny: genre perception and categorization in social video sharing
Categorization of online videos is often treated as a tag suggestion task; tags can be generated by individuals or by machine classification. In this paper, we suggest categoriza...
Jude Yew, David A. Shamma, Elizabeth F. Churchill
ESORICS
2004
Springer
15 years 3 months ago
A Vector Model of Trust for Developing Trustworthy Systems
All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the specification of trust and for reaso...
Indrajit Ray, Sudip Chakraborty