Sciweavers

1353 search results - page 76 / 271
» Securing Current and Future Process Control Systems
Sort
View
DRM
2003
Springer
15 years 8 months ago
How DRM-based content delivery systems disrupt expectations of "personal use"
We set out to examine whether current, DRM-based online offerings of music and movies accord with consumers’ current expectations regarding the personal use of copyrighted works...
Deirdre K. Mulligan, John Han, Aaron J. Burstein
DSN
2005
IEEE
15 years 9 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...
IJIT
2004
15 years 4 months ago
Adaptive Algorithm to Predict the QoS of Web Processes and Workflows
Workflow Management Systems (WfMS) allow organizations to streamline and automate business processes and reengineer their structure. One important requirement for this type of syst...
Jorge Cardoso
103
Voted
ISCAS
2006
IEEE
214views Hardware» more  ISCAS 2006»
15 years 9 months ago
Multimode digital SMPS controller IC for low-power management
This paper introduces a novel low-power digital future, are expected to run at frequencies beyond 10 MHz. In controller for high frequency dc-dc switch-mode power supplies addition...
N. Rahman, A. Parayandeh, Kun Wang, A. Prodic
GVD
2009
191views Database» more  GVD 2009»
15 years 1 months ago
Query Processing on Multi-Core Architectures
The upcoming generation of computer hardware poses several new challenges for database developers and engineers. Software in general and database management systems (DBMSs) in par...
Frank Huber, Johann Christoph Freytag