Sciweavers

559 search results - page 25 / 112
» On Computing the Canonical Features of Software Systems
Sort
View
WIAS
2010
102views more  WIAS 2010»
14 years 8 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
ICSE
2005
IEEE-ACM
15 years 9 months ago
Re-engineering software architecture of home service robots: a case study
With the advances of robotics, computer science, and other related areas, home service robots attract much attention from both academia and industry. Home service robots consists ...
Moonzoo Kim, Jaejoon Lee, Kyo Chul Kang, Youngjin ...
POPL
2002
ACM
15 years 10 months ago
Predicate abstraction for software verification
e Abstraction for Software Verification Cormac Flanagan Shaz Qadeer Compaq Systems Research Center 130 Lytton Ave, Palo Alto, CA 94301 Software verification is an important and di...
Cormac Flanagan, Shaz Qadeer
57
Voted
ECIS
2004
14 years 11 months ago
Selling Packaged Software: An Ethical Analysis
Within the IS literature there is little discussion on selling software products in general and especially from the ethical point of view. Similarly, within computer ethics, altho...
Alison Adam, Ben Light
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
15 years 1 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont