Sciweavers

2056 search results - page 170 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
15 years 6 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
IUI
2004
ACM
15 years 10 months ago
A multiple-application conversational agent
In this paper, we describe the rationale behind and architecture of a conversational agent capable of speech enabling multiple applications Categories and Subject Descriptors H5.2...
Steven Ross, Elizabeth Brownholtz, Robert Armes
CISIS
2009
IEEE
15 years 11 months ago
A Lightweight Implementation of Trusted Domain Enforcement for Secure Embedded Web Server
—Deployment of open source software for embedded system is increasing while ubiquitous devices have become widely used. System designer need to cope with malicious input which is...
Ruo Ando
CGO
2006
IEEE
15 years 10 months ago
Compiling for EDGE Architectures
Explicit Data Graph Execution (EDGE) architectures offer the possibility of high instruction-level parallelism with energy efficiency. In EDGE architectures, the compiler breaks ...
Aaron Smith, Jon Gibson, Bertrand A. Maher, Nichol...
CODES
1999
IEEE
15 years 8 months ago
Software controlled power management
Reducing power consumption is critical in many system designs. Dynamic power management is an effective approach to decrease power without significantly degrading performance. Pow...
Yung-Hsiang Lu, Tajana Simunic, Giovanni De Michel...