Sciweavers

220 search results - page 10 / 44
» Verifying a signature architecture: a comparative case study
Sort
View
CORR
2008
Springer
102views Education» more  CORR 2008»
14 years 11 months ago
SAFIUS - A secure and accountable filesystem over untrusted storage
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention ...
V. Sriram, Ganesh M. Narayan, K. Gopinath
IFIP
2010
Springer
14 years 6 months ago
Model Checking of Concurrent Algorithms: From Java to C
Concurrent software is difficult to verify. Because the thread schedule is not controlled by the application, testing may miss defects that occur under specific thread schedules. T...
Cyrille Artho, Masami Hagiya, Watcharin Leungwatta...
109
Voted
CANDC
2004
ACM
14 years 11 months ago
The difficult interpretation of transcriptome data: the case of the GATC regulatory network
Genomic analyses on part of Escherichia coli's chromosome had suggested the existence of a GATC regulated network. This has recently been confirmed through a transcriptome an...
Alessandra Riva, Marie-Odile Delorme, Tony Chevali...
ICSE
2003
IEEE-ACM
15 years 11 months ago
Experiences from the Architectural Change Process
A good software architecture is becoming recognized as a major factor for successful products. There has been much research on the technical aspects of software architecture and i...
Josef Nedstam, Even-André Karlsson, Martin ...
90
Voted
DATE
2003
IEEE
145views Hardware» more  DATE 2003»
15 years 4 months ago
Automated Bus Generation for Multiprocessor SoC Design
The performance of a system, especially a multiprocessor system, heavily depends upon the efficiency of its bus architecture. This paper presents a methodology to generate a custo...
Kyeong Keol Ryu, Vincent John Mooney