Sciweavers

2236 search results - page 252 / 448
» Secure Software Design in Practice
Sort
View
CSE
2009
IEEE
15 years 7 months ago
Privacy-Enhanced Event Scheduling
—Event schedulers, well-known from groupware and social software, typically share the problem that they disclose detailed availability patterns of their users. This paper disting...
Benjamin Kellermann, Rainer Böhme
SOUPS
2009
ACM
15 years 9 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
EUROSYS
2007
ACM
16 years 7 days ago
Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels
Continuously running systems require kernel software updates applied to them without downtime. Facilitating fast reboots, or delaying an update may not be a suitable solution in m...
Kristis Makris, Kyung Dong Ryu
98
Voted
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 3 months ago
An annotation based approach to support design communication
The aim of this paper is to propose an approach based on the concept of annotation for supporting design communication. In this paper, we describe a co-operative design case study...
Onur Hisarciklilar, Jean-François Boujut
FM
2006
Springer
172views Formal Methods» more  FM 2006»
15 years 6 months ago
The Embedded Systems Design Challenge
We summarize some current trends in embedded systems design and point out some of their characteristics, such as the chasm between analytical and computational models, and the gap ...
Thomas A. Henzinger, Joseph Sifakis