Sciweavers

6907 search results - page 922 / 1382
» Securing distributed adaptation
Sort
View
136
Voted
WOSP
2010
ACM
15 years 8 months ago
A framework for utility-based service oriented design in SASSY
The architecture of a software system has a significant impact on its quality of service (QoS) as measured by several performance metrics such as execution time, availability, th...
Daniel A. Menascé, John M. Ewing, Hassan Go...
131
Voted
RTSS
1999
IEEE
15 years 8 months ago
HoneyWEB: Embedded Web-based Control Applications
High performance monitoring and control of real-time environments over the Internet is of importance to many users. The general public, as well as professionals, desires the abili...
Christiane Iaccarino, Meridith A. Sigel, Ralph E. ...
124
Voted
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
134
Voted
DATE
2004
IEEE
136views Hardware» more  DATE 2004»
15 years 7 months ago
Compact Binaries with Code Compression in a Software Dynamic Translator
Embedded software is becoming more flexible and adaptable, which presents new challenges for management of highly constrained system resources. Software dynamic translation is a t...
Stacey Shogan, Bruce R. Childers
CHES
2006
Springer
205views Cryptology» more  CHES 2006»
15 years 7 months ago
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
Balanced dynamic dual-rail gates and asynchronous circuits have been shown, if implemented correctly, to have natural and efficient resistance to side-channel attacks. Despite thei...
Konrad J. Kulikowski, Alexander B. Smirnov, Alexan...