Sciweavers

331 search results - page 37 / 67
» Software Protection Mechanisms for Dependable Systems
Sort
View
MOBISYS
2007
ACM
15 years 9 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
MICRO
2009
IEEE
120views Hardware» more  MICRO 2009»
15 years 4 months ago
Tribeca: design for PVT variations with local recovery and fine-grained adaptation
With continued advances in CMOS technology, parameter variations are emerging as a major design challenge. Irregularities during the fabrication of a microprocessor and variations...
Meeta Sharma Gupta, Jude A. Rivers, Pradip Bose, G...
MIDDLEWARE
2009
Springer
15 years 4 months ago
Why Do Upgrades Fail and What Can We Do about It?
Abstract. Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading ca...
Tudor Dumitras, Priya Narasimhan
MSWIM
2006
ACM
15 years 3 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
MDAFA
2004
Springer
135views Hardware» more  MDAFA 2004»
15 years 3 months ago
Developing a UML Profile for Modelling Knowledge-Based Systems
Knowledge engineers have favoured a diagrammatic approach for developing knowledge-based systems by adopting those used in software engineering. However, these modelling techniques...
Mohd Syazwan Abdullah, Chris Kimble, Richard F. Pa...