Sciweavers

2261 search results - page 301 / 453
» Modeling the Experimental Software Engineering Process
Sort
View
127
Voted
CODES
2004
IEEE
15 years 7 months ago
Low energy security optimization in embedded cryptographic systems
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
Catherine H. Gebotys
126
Voted
CODES
2011
IEEE
14 years 3 months ago
SoC-TM: integrated HW/SW support for transactional memory programming on embedded MPSoCs
Two overriding concerns in the development of embedded MPSoCs are ease of programming and hardware complexity. In this paper we present SoC-TM, an integrated HW/SW solution for tr...
Cesare Ferri, Andrea Marongiu, Benjamin Lipton, R....
135
Voted
STORAGESS
2005
ACM
15 years 9 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
118
Voted
SIGIR
2010
ACM
15 years 7 months ago
Predicting searcher frustration
When search engine users have trouble finding information, they may become frustrated, possibly resulting in a bad experience (even if they are ultimately successful). In a user ...
Henry A. Feild, James Allan, Rosie Jones
SIGSOFT
2007
ACM
16 years 4 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...