Sciweavers

1234 search results - page 133 / 247
» Privacy-preserving Virtual Machine
Sort
View
IJCAI
2007
15 years 5 months ago
Augmented Experiment: Participatory Design with Multiagent Simulation
To test large scale socially embedded systems, this paper proposes a multiagent-based participatory design that consists of two steps; 1) participatory simulation, where scenario-...
Toru Ishida, Yuu Nakajima, Yohei Murakami, Hideyuk...
JTRES
2009
ACM
15 years 10 months ago
Avoiding unbounded priority inversion in barrier protocols using gang priority management
Large real-time software systems such as real-time Java virtual machines often use barrier protocols, which work for a dynamically varying number of threads without using centrali...
Harald Röck, Joshua S. Auerbach, Christoph M....
CCS
2007
ACM
15 years 10 months ago
An independent audit framework for software dependent voting systems
The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. O...
Sujata Garera, Aviel D. Rubin
DATE
2005
IEEE
162views Hardware» more  DATE 2005»
15 years 9 months ago
A Model-Based Approach for Executable Specifications on Reconfigurable Hardware
UML 2.0 provides a rich set of diagrams for systems documentation and specification. Many efforts have been undertaken to employ different aspects of UML for multiple domains, mai...
Tim Schattkowsky, Wolfgang Müller 0003, Achim...
ISPEC
2005
Springer
15 years 9 months ago
An Email Worm Vaccine Architecture
We present an architecture for detecting “zero-day” worms and viruses in incoming email. Our main idea is to intercept every incoming message, prescan it for potentially danger...
Stelios Sidiroglou, John Ioannidis, Angelos D. Ker...