Sciweavers

331 search results - page 44 / 67
» Software Protection Mechanisms for Dependable Systems
Sort
View
PRDC
2009
IEEE
15 years 4 months ago
Evaluating the Use of Reference Run Models in Fault Injection Analysis
—Fault injection (FI) has been shown to be an effective approach to assessing the dependability of software systems. To determine the impact of faults injected during FI, a given...
Matthew Leeke, Arshad Jhumka
CCS
2008
ACM
14 years 11 months ago
Avoiding timing channels in fixed-priority schedulers
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simpl...
Marcus Völp, Claude-Joachim Hamann, Hermann H...
SAC
2008
ACM
14 years 8 months ago
ICER: a tool for finding errors in a UML model
Detecting errors in an early phase of software development can help to reduce the cost of software systems. Many research attempts presented a fixed set of rules to help finding e...
Wuwei Shen, Dae-Kyoo Kim
SYSTOR
2010
ACM
15 years 2 months ago
On the DMA mapping problem in direct device assignment
I/O intensive workloads running in virtual machines can suffer massive performance degradation. Direct assignment of I/O devices to virtual machines is the best performing I/O vir...
Ben-Ami Yassour, Muli Ben-Yehuda, Orit Wasserman
MM
2004
ACM
97views Multimedia» more  MM 2004»
15 years 3 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...