Sciweavers

1481 search results - page 188 / 297
» Software controlled power management
Sort
View
STORAGESS
2006
ACM
15 years 7 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
APSEC
1999
IEEE
15 years 6 months ago
Enhancing Object-Based System Composition through Per-Object Mixins
The management of complexity in large systems is traditionally focused on the modeling and management of classes and hierarchies of classes. In order to improve the compositional ...
Gustaf Neumann, Uwe Zdun
ECLIPSE
2007
ACM
15 years 5 months ago
Building, deploying, and monitoring distributed applications with Eclipse and R-OSGI
Designing and testing distributed applications is still a difficult task that requires in-depth knowledge about networking issues. Eclipse is, among other things, a powerful and w...
Jan S. Rellermeyer, Gustavo Alonso, Timothy Roscoe
WISA
2007
Springer
15 years 7 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
DATE
2006
IEEE
128views Hardware» more  DATE 2006»
15 years 5 months ago
Platform-based design of wireless sensor networks for industrial applications
We present a methodology, an environment and supporting tools to map an application on a wireless sensor network (WSN). While the method is quite general, we use extensively an exa...
Alvise Bonivento, Luca P. Carloni, Alberto L. Sang...