Sciweavers

2271 search results - page 332 / 455
» Scalable Software Libraries
Sort
View
171
Voted
NDSS
2003
IEEE
15 years 8 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
UIST
2003
ACM
15 years 8 months ago
GADGET: a toolkit for optimization-based approaches to interface and display generation
Recent work is beginning to reveal the potential of numerical optimization as an approach to generating interfaces and displays. Optimization-based approaches can often allow a mi...
James Fogarty, Scott E. Hudson
106
Voted
ERCIMDL
2003
Springer
114views Education» more  ERCIMDL 2003»
15 years 8 months ago
Implementing Preservation Strategies for Complex Multimedia Objects
Addressing the preservation and long-term access issues for digital resources is one of the key challenges facing informational organisations such as libraries, archives, cultural ...
Jane Hunter, Sharmin Choudhury
118
Voted
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
15 years 8 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
116
Voted
CODES
2002
IEEE
15 years 8 months ago
Symbolic model checking of Dual Transition Petri Nets
This paper describes the formal verification of the recently introduced Dual Transition Petri Net (DTPN) models [12], using model checking techniques. The methodology presented a...
Mauricio Varea, Bashir M. Al-Hashimi, Luis Alejand...