Sciweavers

14 search results - page 1 / 3
» sis 2008
Sort
View
SIS
2008
14 years 11 months ago
Integrating Privacy Policies into Business Processes
Michele Chinosi, Alberto Trombetta
SIS
2008
14 years 11 months ago
A Multi-Dimensional Classification for Users of Security Patterns
Michael VanHilst, Eduardo B. Fernández, Fab...
SIS
2008
14 years 11 months ago
New Attack Strategy for the Shrinking Generator
Pino Caballero-Gil, Amparo Fúster-Sabater, ...
SIS
2008
14 years 11 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
HPCA
2008
IEEE
15 years 10 months ago
Serializing instructions in system-intensive workloads: Amdahl's Law strikes again
Serializing instructions (SIs), such as writes to control registers, have many complex dependencies, and are difficult to execute out-of-order (OoO). To avoid unnecessary complexi...
Philip M. Wells, Gurindar S. Sohi