Sciweavers

14 search results - page 1 / 3
» sis 2008
Sort
View
83
Voted
SIS
2008
15 years 1 months ago
Integrating Privacy Policies into Business Processes
Michele Chinosi, Alberto Trombetta
SIS
2008
15 years 1 months ago
A Multi-Dimensional Classification for Users of Security Patterns
Michael VanHilst, Eduardo B. Fernández, Fab...
SIS
2008
15 years 1 months ago
New Attack Strategy for the Shrinking Generator
Pino Caballero-Gil, Amparo Fúster-Sabater, ...
SIS
2008
15 years 1 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
HPCA
2008
IEEE
16 years 15 days ago
Serializing instructions in system-intensive workloads: Amdahl's Law strikes again
Serializing instructions (SIs), such as writes to control registers, have many complex dependencies, and are difficult to execute out-of-order (OoO). To avoid unnecessary complexi...
Philip M. Wells, Gurindar S. Sohi