Sciweavers

2236 search results - page 309 / 448
» Secure Software Design in Practice
Sort
View
SOSP
2003
ACM
15 years 6 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
AC
2000
Springer
14 years 9 months ago
State of the art in electronic payment systems
nvented abstract representations of value. As time passed, representations of value became more abstract, progressing from barter through bank notes, payment orders, checks, credit...
N. Asokan, Philippe A. Janson, Michael Steiner, Mi...
SIGMOD
2008
ACM
118views Database» more  SIGMOD 2008»
15 years 10 months ago
Freebase: a collaboratively created graph database for structuring human knowledge
Freebase is a practical, scalable tuple database used to structure general human knowledge. The data in Freebase is collaboratively created, structured, and maintained. Freebase c...
Kurt D. Bollacker, Colin Evans, Praveen Paritosh, ...
FDL
2003
IEEE
15 years 3 months ago
UML-based Specifications of an Embedded System oriented to HW/SW partitioning: a case study
The Unified Modelling Language (UML) is a language for specifying, visualizing, constructing, and documenting the artefacts of software systems, as well as for modelling business ...
A. Minosi, S. Mankan, A. Martinola, F. Balzarini, ...
DCW
2000
Springer
15 years 2 months ago
The GIPSY Architecture
Intensional Programming involves the programming of expressions placed in an inherent multidimensional context space. It is an emerging and highly dynamic domain of general applica...
Joey Paquet, Peter G. Kropf