Sciweavers

1860 search results - page 311 / 372
» tools 2009
Sort
View
146
Voted
CHIMIT
2009
ACM
15 years 7 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
203
Voted
POPL
2009
ACM
16 years 1 months ago
Modular code generation from synchronous block diagrams: modularity vs. code size
We study modular, automatic code generation from hierarchical block diagrams with synchronous semantics. Such diagrams are the fundamental model behind widespread tools in the emb...
Roberto Lublinerman, Christian Szegedy, Stavros Tr...
91
Voted
HPCA
2009
IEEE
16 years 1 months ago
Fast complete memory consistency verification
The verification of an execution against memory consistency is known to be NP-hard. This paper proposes a novel fast memory consistency verification method by identifying a new na...
Yunji Chen, Yi Lv, Weiwu Hu, Tianshi Chen, Haihua ...
121
Voted
NDSS
2009
IEEE
15 years 7 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
176
Voted
MICCAI
2009
Springer
15 years 6 months ago
Optical Biopsy Mapping for Minimally Invasive Cancer Screening.
The quest for providing tissue characterization and functional mapping during minimally invasive surgery (MIS) has motivated the development of new surgical tools that extend the...
Peter Mountney, Stamatia Giannarou, Daniel Elson...