Sciweavers

3022 search results - page 183 / 605
» Make Way for WayMaker
Sort
View
ACSAC
2006
IEEE
15 years 10 months ago
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy
In this paper we examine the problem of entering sensitive data, such as passwords, from an untrusted machine. By untrusted we mean that it is suspected to be infected with spywar...
Dinei A. F. Florêncio, Cormac Herley
CSMR
2006
IEEE
15 years 10 months ago
Using Version Information in Architectural Clustering - A Case Study
This paper describes a case study that uses clustering to group classes of an existing objectoriented system of significant size into subsystems. The clustering process is based o...
Andreas Wierda, Eric Dortmans, Lou J. Somers
DATE
2006
IEEE
118views Hardware» more  DATE 2006»
15 years 10 months ago
Design and implementation of a modular and portable IEEE 754 compliant floating-point unit
Multimedia and communication algorithms from embedded system domain often make extensive use of floating-point arithmetic. Due to the complexity and expense of the floating-poin...
Kingshuk Karuri, Rainer Leupers, Gerd Ascheid, Hei...
DSN
2006
IEEE
15 years 10 months ago
CADRE: Cycle-Accurate Deterministic Replay for Hardware Debugging
One of the main reasons for the difficulty of hardware verification is that hardware platforms are typically nondeterministic at clock-cycle granularity. Uninitialized state ele...
Smruti R. Sarangi, Brian Greskamp, Josep Torrellas
EDOC
2006
IEEE
15 years 10 months ago
Enterprise Computing Systems as Information Factories
The analysis, and eventual approval or rejection, of new enterprise information technology (IT) initiatives often proceeds on the basis of informal estimates of return on investme...
K. Mani Chandy, Lu Tian, Daniel M. Zimmerman