Sciweavers

2429 search results - page 288 / 486
» Using Aspects to Design a Secure System
Sort
View
APLAS
2007
ACM
15 years 7 months ago
More Typed Assembly Languages for Confidentiality
We propose a series of type systems for the information-flow security of assembly code. These systems extend previous work TALC with some timing annotations and associated judgment...
Dachuan Yu
JNW
2006
145views more  JNW 2006»
15 years 3 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
AR
2002
92views more  AR 2002»
15 years 3 months ago
Development of a high-performance direct-drive joint
This paper reports on advances in the design and development of a high-performance direct-drive joint for robotics and automation. The joint integrates a motor, a torque sensor and...
Farhad Aghili, Martin Buehler, John M. Hollerbach
IGARSS
2010
15 years 1 months ago
Realization of the NASA Dual-Frequency Dual-Polarized Doppler Radar (D3R)
This paper describes some of the novel technologies adopted in the realization of the NASA Dual-frequency Dualpolarized Doppler Radar (D3R) system for to be used by the GPM ground...
Manuel Vega, James Carswell, V. Chandrasekar, Math...
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 10 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek