Sciweavers

331 search results - page 19 / 67
» Software Protection Mechanisms for Dependable Systems
Sort
View
HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
15 years 3 months ago
Exploiting Mobile Agents for Structured Distributed Software-Implemented Fault Injection
Embedded distributed real-time systems are traditionally used in safety-critical application areas such as avionics, healthcare, and the automotive sector. Assuring dependability ...
Thomas M. Galla, Karin Anna Hummel, Burkhard Peer
PRDC
2002
IEEE
15 years 2 months ago
Caveat Emptor: Making Grid Services Dependable from the Client Side
Grid computing relies on fragile partnerships. Clients with hundreds or even thousands of pending service requests must seek out and form temporary alliances with remote servers e...
Miron Livny, Douglas Thain
ASPLOS
2006
ACM
15 years 3 months ago
Dependable != unaffordable
This paper presents a software architecture for hardware fault tolerance based on loosely-synchronized, redundant virtual machines (LSRVM). LSRVM will provide high levels of relia...
Alan L. Cox, Kartik Mohanram, Scott Rixner
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
15 years 3 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
ICC
2009
IEEE
14 years 7 months ago
On the Interaction Between Channel Coding and Hierarchical Modulation
1 Classical systems using hierarchical modulation (such as DVB-SH) involve a "high-priority" (HP) and a "lowpriority" (LP) bit stream that are separately and in...
Seyed Mohammad Sajad Sadough, Pierre Duhamel