Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development...
David P. Gilliam, Thomas L. Wolfe, Joseph S. Sheri...
A mobile Digital Rights Management platform is proposed that follows the DRM reference architecture while including several important functions lacking in the OMA DRM. The platfor...
DSP processors usually provide dedicated address generation units (AGUs) to assist address computation. By carefully allocating variables in the memory, DSP compilers take advanta...
With advances in process technology, soft errors (SE) are becoming an increasingly critical design concern. Due to their large area and high density, caches are worst hit by soft ...