top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Security protocols XX [electronic resource] : 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised selected papers / Bruce Christianson [and others] (eds.).
Security protocols XX [electronic resource] : 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised selected papers / Bruce Christianson [and others] (eds.).
Creatore [International Workshop on Security Protocols (20th : 2012 : Cambridge, England)]
Estensione 1 online resource.
Disciplina 005.8
Accesso persona Christianson, Bruce
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Computers and Society
ISBN 9783642356940
364235694X
3642356931
9783642356933
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: Bringing Protocols to Life (Transcript of Discussion) / Bruce Christianson -- Secure Internet Voting Protocol for Overseas Military Voters / Todd R. Andel, Alec Yasinsac -- Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion) / Todd R. Andel -- Self-enforcing Electronic Voting / Feng Hao, Brian Randell, Dylan Clarke -- Self-enforcing Electronic Voting (Transcript of Discussion) / Feng Hao -- Approaches to Modelling Security Scenarios with Domain-Specific Languages / Phillip J. Brooke, Richard F. Paige, Christopher Power -- Approaches to Modelling Security Scenarios with Domain-Specific Languages (Transcript of Discussion) / Phillip J. Brooke -- The Casino and the OODA Loop / Sandy Clark, Matt Blaze, Jonathan M. Smith -- The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion) / Matt Blaze -- Statistical Metrics for Individual Password Strength / Joseph Bonneau.
Statistical Metrics for Individual Password Strength (Transcript of Discussion) / Joseph Bonneau -- Street-Level Trust Semantics for Attribute Authentication / Tiffany Hyun-Jin Kim, Virgil Gligor, Adrian Perrig -- Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion) / Virgil Gligor -- Analysis of Issues and Challenges of E-Voting in the UK / Dylan Clarke, Feng Hao, Brian Randell -- Analysis of Issues and Challenges of E-Voting in the UK (Transcript of Discussion) / Dylan Clarke -- Protocol Governance: The Elite, or the Mob? / Ross Anderson -- Protocol Governance: The Elite, or the Mob? (Transcript of Discussion) / Ross Anderson -- Usability Issues in Security / Yuko Murayama, Yasuhiro Fujihara, Yoshia Saito, Dai Nishioka -- Usability Issues in Security (Transcript of Discussion) / Yuko Murayama -- Usable Privacy by Visual and Interactive Control of Information Flow / Shah Mahmood, Yvo Desmedt.
Usable Privacy by Visual and Interactive Control of Information Flow (Transcript of Discussion) / Shah Mahmood -- Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System / Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro -- Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion) / Mauro Conti -- Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices / Oliver Stannard, Frank Stajano -- Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion) / Frank Stajano -- Stayin' Alive: Aliveness as an Alternative to Authentication / Jonathan Anderson, Robert N.M. Watson -- Stayin' Alive: Aliveness as an Alternative to Authentication (Transcript of Discussion) / Jonathan Anderson -- Paul Revere Protocols / Paul Syverson -- Paul Revere Protocols (Transcript of Discussion) / Paul Syverson.
Record Nr. NYU-004389354
[International Workshop on Security Protocols (20th : 2012 : Cambridge, England)]  
Materiale a stampa
Lo trovi qui: New York University
IT convergence and security 2012 / Kuinam J. Kim, Kyung-Yong Chung, editors
IT convergence and security 2012 / Kuinam J. Kim, Kyung-Yong Chung, editors
Estensione 1 online resource.
Disciplina 004
Accesso persona Kim, Kuinam J.
Chung, Kyung-Yong
Genere/Forma Electronic books
Soggetto non controllato Engineering
Computer Communication Networks
Telecommunication
Communications Engineering, Networks
Information Systems Applications (incl. Internet)
ISBN 9789400758605
940075860X
9789400758599
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security Fundamentals -- Development of an Automatic Document Malware Analysis System / Hong-Koo Kang, Ji-Sang Kim, Byung-Ik Kim, Hyun-Cheol Jeong -- Study of Behavior-Based High Speed Visit/Inspection Technology to Detect Malicious Websites / Ji-Sang Kim, Hong-Koo Kang, Hyun-Cheol Jeong -- One-Way Hash Function Based on Cellular Automata / Jun-Cheol Jeon -- A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory / Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof -- Forensic Evidence Collection Procedures of Smartphone in Crime Scene / Jeong-Hyun Lim, Chang-Woo Song, Kyung-Yong Chung, Ki-Wook Rim, Jung-Hyun Lee -- NAC System Analysis and Design for Improvement Model / Seung-Jae Yoo, Jeong-Mo Yang, Hwan-Seok Yang -- Industrial & Business Information Security -- Analysis of Methods for Detecting Compromised Nodes and its Countermeasures / Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai -- Protecting Advertisers Against Click Frauds / Rattikorn Hewett, Abhishek Agarwal.
A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS) / Seondong Heo, Jungmin Lim, Minsoo Lee, Soojin Lee, Hyunsoo Yoon -- Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment / Dong-Hwi Lee, Kyong-Ho Choi -- A Study About Security Awareness Program Based on RFID Access Control System / Kyong-Ho Choi, DongHwi Lee -- A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method / Ae Chan Kim, Won Hyung Park, Dong Hoon Lee -- An Investigation on the Research Topics in Relation to Information Systems in Supply Chain Management / Younjung Kim, Young-Ho Lee, Kyung-Yong Chung, Kang-Dae Lee -- Designing a Model for Context Awareness Based Reliable Auction-Recommending System (CARARS) by Utilizing Advanced Information / Hwa-Jin Park, Sang-Beom Kim -- Security Protocols and Applications -- A Secure Self-Encryption Scheme for Resource Limited Mobile Devices / Yongjoo Shin, Seungjae Shin, Minsoo Kim, Hyunsoo Yoon.
A Study on the Network Stability Measurement Based on an Articulation Nodes with Weight Value / Myung-Ki Jung, Seongjin Ahn -- An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- An Identity-Based Ring Signcryption Scheme / Gaurav Sharma, Suman Bala, Anil K. Verma -- A Secure DS-CDMA Technique with Capacity Enhancement for Ad Hoc Wireless Networks / Muhammad Zeeshan, Shoab Ahmed Khan, Muhammad Yasir Malik -- A Study on Traceback of Illegal Users Using Anonymity Technology in BitTorrent / Geon II Heo, Nam Hun Kim, Ah Ra Jo, Sae In Choi, Won Hyung Park -- Internet Anonymity in Syria, Challenges and Solution / T. Eissa, Gi-hwan Cho -- Convergence Security -- Comparison of Attacks and Security Analyses for Different RFID Protocols / Jung Tae Kim -- Honeypot Using Dynamic Allocation Technique with IP Scan / Hwan-Seok Yang -- Attribute-Based Encryption for Commercial Content Distribution / Hyoseung Kim, Seunghwan Park, Jong Hwan Park, Dong Hoon Lee.
IT Convergence Applications -- Sensibility Extraction for Bicycle Design Using RFID Tag-Attached Crayons / Ho-Ill Jung, Seung-Jin Lee, Jeong-Hoon Kang, Min-Hyun Kim, Jong-Wan Kim, Bo-Hyun Lee -- Efficient Handover Schemes for Railroad Communications in 4G Mobile Networks / Ronny Yongho Kim, Baik Kim -- Cyber Threat Prediction Model Using Security Monitoring System Event / Neo Park, Won Hyung Park -- A Study for Car Insurance Service Using Vehicle Real Time Information / Yong-Yoon Shin, Byung-Yun Lee -- An MMU Virtualization for Embedded Systems / Sung-Hoon Son -- The Design and Implementation of Start Stop System with Multi-Protocol in Automotive Smart Key System / Kyeong-Seob Kim, Yun-Sub Lee, In-Seong Song, Sang-Bang Choi -- The Design and Implementation of Improved Anti-Collision Algorithm for Vehicle User Authentication System / Kyeong-Seob Kim, Yun-Sub Lee, Sang-Bang Choi -- Multi-Port Register File Design and Implementation for the SIMD Programmable Shader / Kyeong-Seob Kim, Yun-Sub Lee, Sang-Bang Choi.
Design Exploration Technique for Software Component Mapping of AUTOSAR Development Methodology / Kabsu Han, Jeonghun Cho -- Interoperability and Control Systems for Medical Cyber Physical Systems / Min-Woo Jung, Jeonghun Cho -- Ubiquitous Logistics Management in the Steel Industry / Sang-Young Lee, Yoon-Seok Lee -- Performance Evaluation of Train Propulsion Control on Ethernet Network Using TrueTime / Hyeon-Chyeol Hwang, Yong-Kuk Oh, Ronny Yongho Kim -- Intelligent Control System for Railway Level Crossing Safety / Bong-Kwan Cho, Sang-Hwan Ryu, Hyeon-Chyeol Hwang, Seoung-Chon Koh, Do-Hyeon Lee -- Moving Average Estimator Least Mean Square Using Echo Cancellation Algorithm / Sang-Yeob Oh, Chan-Shik Ahn -- An Abrupt Signal Detection as Accident Detection by Hamiltonian Eigenvalue on Highway CCTV Traffic Signal / In Jeong Lee -- Implementation of Improved DPD Algorithm Using the Approximation Hessian Technique and an Adaptive Filter / Jeong-Seok Jang, Gyong-Hak Lee.
Record Nr. NYU-004389498
Materiale a stampa
Lo trovi qui: New York University
Selected areas in cryptography : 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised selected papers / Lars R. Knudsen, Huapeng Wu (eds.).
Selected areas in cryptography : 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised selected papers / Lars R. Knudsen, Huapeng Wu (eds.).
Creatore [SAC (Conference) (19th : 2012 : Windsor, Ont.)]
Estensione 1 online resource.
Disciplina 005.8/2
Accesso persona Knudsen, Lars, 1962-
Wu, Huapeng, 1965-
Genere/Forma Congresses
Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Systems and Data Security
Algorithm Analysis and Problem Complexity
ISBN 9783642359996
364235999X
3642359981
9783642359989
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers / Martin R. Albrecht, Gregor Leander -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery / Zhenyu Huang, Dongdai Lin -- Cryptanalysis of the Xiao -- Lai White-Box AES Implementation / Yoni De Mulder, Peter Roelse, Bart Preneel -- Digital Signatures -- A Practical Leakage-Resilient Signature Scheme in the Generic Group Model / David Galindo, Srinivas Vivek -- Forward Secure Signatures on Smart Cards / Andreas Hülsing, Christoph Busold, Johannes Buchmann -- The Stafford Tavares Lecture -- Extracts from the SHA-3 Competition / Vincent Rijmen -- Stream Ciphers -- Cryptanalysis of the "Kindle" Cipher / Alex Biryukov, Gaëtan Leurent, Arnab Roy -- Cryptographically Strong de Bruijn Sequences with Large Periods / Kalikinkar Mandal, Guang Gong -- Cryptanalysis of the Loiss Stream Cipher / Alex Biryukov, Aleksandar Kircanski, Amr M. Youssef.
Implementations -- Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three / Reza R. Farashahi, Hongfeng Wu, Chang-An Zhao -- Efficient Implementation of Bilinear Pairings on ARM Processors / Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao -- Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over F21223 / Jithra Adikari, M. Anwar Hasan, Christophe Negre -- Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers / Nisha Jacob, Sirote Saetang, Chien-Ning Chen, Sebastian Kutzner, San Ling -- Block Cipher Cryptanalysis -- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach / Takanori Isobe, Kyoji Shibutani -- Improved Cryptanalysis of the Block Cipher KASUMI / Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang -- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers / Yu Sasaki, Lei Wang -- Lattices -- Attacking (EC)DSA Given Only an Implicit Hint / Jean-Charles Faugère, Christopher Goyet, Guénaël Renault.
Lattice Reduction for Modular Knapsack / Thomas Plantard, Willy Susilo, Zhenfei Zhang -- Hash Functions -- The Boomerang Attacks on the Round-Reduced Skein-512 / Hongbo Yu, Jiazhe Chen, Xiaoyun Wang -- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function / Aleksandar Kircanski, Yanzhao Shen, Gaoli Wang, Amr M. Youssef -- Hash Functions -- Provable Security of BLAKE with Non-ideal Compression Function / Elena Andreeva, Atul Luykx, Bart Mennink -- Block Cipher Constructions -- \textnormal\textscTWINE : A Lightweight Block Cipher for Multiple Platforms / Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka, Eita Kobayashi -- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions / Shengbao Wu, Mingsheng Wang, Wenling Wu -- Miscellaneous -- Private Stream Search at Almost the Same Communication Cost as a Regular Search / Matthieu Finiasz, Kannan Ramchandran -- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks / Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, François-Xavier Standaert.
Record Nr. NYU-004389908
[SAC (Conference) (19th : 2012 : Windsor, Ont.)]  
Materiale a stampa
Lo trovi qui: New York University
Topics in cryptology-- CT-RSA 2013 : the Cryptographers' track at the RSA Conference 2013, San Francisco, CA, USA, February 25-March 1, 2013. Proceedings / Ed Dawson (ed.).
Topics in cryptology-- CT-RSA 2013 : the Cryptographers' track at the RSA Conference 2013, San Francisco, CA, USA, February 25-March 1, 2013. Proceedings / Ed Dawson (ed.).
Creatore [Cryptographers' Track at RSA Conference (2013 : San Francisco, Calif.)]
Estensione 1 online resource.
Disciplina 005.8/2
Accesso persona Dawson, Ed (Edward)
Genere/Forma Congresses
Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Operating systems (Computers)
Data protection
Data encryption (Computer science)
Coding theory
Systems and Data Security
e-Commerce/e-business
Coding and Information Theory
ISBN 9783642360954
3642360955
9783642360947
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Side Channel Attacks I -- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations / Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Justine Wild -- Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL / Cyril Arnaud, Pierre-Alain Fouque -- Digital Signatures I -- Fair Exchange of Short Signatures without Trusted Third Party / Philippe Camacho -- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures / Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling -- Public-Key Encryption I -- A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption / Yannick Seurin, Joana Treger -- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks / Shengli Liu, Jian Weng, Yunlei Zhao -- Cryptographic Protocols I -- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes / Eduarda S.V. Freire, Kenneth G. Paterson, Bertram Poettering -- Randomized Partial Checking Revisited / Shahram Khazaei, Douglas Wikström.
Secure Implementation Methods -- Randomly Failed! The State of Randomness in Current Java Implementations / Kai Michaelis, Christopher Meyer, Jörg Schwenk -- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl / Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe -- Symmetric Key Primitives I -- Collisions for the WIDEA-8 Compression Function / Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varıcı -- Finding Collisions for Round-Reduced SM3 / Florian Mendel, Tomislav Nad, Martin Schläffer -- Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures / Stanislav Bulygin, Michael Walter, Johannes Buchmann -- Side Channel Attacks II -- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag / Thomas Korak, Thomas Plos -- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness / Yu Yu, François-Xavier Standaert -- Cryptographic Protocols II -- Cryptanalytic Attacks on MIFARE Classic Protocol / Jovan Dj. Golić
Asynchronous Computational VSS with Reduced Communication Complexity / Michael Backes, Amit Datta, Aniket Kate -- Public-Key Encryption II -- Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 / Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka -- Solving BDD by Enumeration: An Update / Mingjie Liu, Phong Q. Nguyen -- Identity-Based Encryption -- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions / Karyn Benson, Hovav Shacham, Brent Waters -- Accountable Authority Identity-Based Encryption with Public Traceability / Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng -- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption / Jae Hong Seo, Keita Emura -- Symmetric Key Primitives II -- The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users / Mike Bond, George French, Nigel P. Smart, Gaven J. Watson -- A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy / Michal Hojsík, Veronika Půlpánová -- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis / Jiqiang Lu, Wun-She Yap, Yongzhuang Wei.
Record Nr. NYU-004390454
[Cryptographers' Track at RSA Conference (2013 : San Francisco, Calif.)]  
Materiale a stampa
Lo trovi qui: New York University
System analysis and modeling : theory and practice : 7th International Workshop, SAM 2012, Innsbruck, Austria, October 1-2, 2012. Revised selected papers / Øystein Haugen, Rick Reed, Reinhard Gotzhein (eds.).
System analysis and modeling : theory and practice : 7th International Workshop, SAM 2012, Innsbruck, Austria, October 1-2, 2012. Revised selected papers / Øystein Haugen, Rick Reed, Reinhard Gotzhein (eds.).
Creatore [SAM (Workshop : System analysis) (7th : 2012 : Innsbruck, Austria)]
Estensione 1 online resource.
Disciplina 004.2/1
Accesso persona Haugen, Øystein
Reed, Rick
Gotzhein, Reinhard
Genere/Forma Congresses
Llibres electrònics
Congressos
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Information Systems
Programming Languages, Compilers, Interpreters
Management of Computing and Information Systems
ISBN 9783642367571
3642367577
3642367569
9783642367564
Classificazione 54.61
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote 1. Models '67 Revisited / Birger Møller-Pedersen -- Test and Analysis I -- Identification and Selection of Interaction Test Scenarios for Integration Testing / Mohamed Mussa, Ferhat Khendek -- An Approach to Specify and Analyze Goal Model Families / Azalia Shamsaei, Daniel Amyot, Alireza Pourshahid, Edna Braun, Eric Yu -- Language Enhancements -- Real-Time Tasks in SDL / Dennis Christmann, Reinhard Gotzhein -- Prototyping Domain Specific Languages as Extensions of a General Purpose Language / Andreas Blunk, Joachim Fischer -- Fuzzy Subjects -- Behavioral Fuzzing Operators for UML Sequence Diagrams / Martin Schneider, Jürgen Großmann, Nikolay Tcholtchev, Ina Schieferdecker -- Relativity and Abstract State Machines / Edel Sherratt -- Keynote 2. From Earthquake Detection to Traffic Surveillance -- About Information and Communication Infrastructures for Smart Cities / Joachim Fischer, Jens-Peter Redlich, Björn Scheuermann, Jochen Schiller, Mesut Günes -- Components and Composition -- On Deriving Detailed Component Design from High-Level Service Specification / Urooj Fatima, Rolv Bræk -- Type-Safe Symmetric Composition of Metamodels Using Templates / Henning Berg, Birger Møller-Pedersen -- Configuring and Product Lines -- Towards Correct Product Derivation in Model-Driven Product Lines / Xiaorui Zhang, Birger Møller-Pedersen -- Simulation Configuration Modeling of Distributed Communication Systems / Mihal Brumbulli, Joachim Fischer -- Analysis II -- GRL Model Validation: A Statistical Approach / Jameleddine Hassine, Daniel Amyot -- Configuration-Based Service Availability Analysis for Middleware Managed Applications / Ali Kanso, Maria Toeroe, Ferhat Khendek.
Record Nr. NYU-004390463
[SAM (Workshop : System analysis) (7th : 2012 : Innsbruck, Austria)]  
Materiale a stampa
Lo trovi qui: New York University
Architecture of computing systems - ARCS 2013 : 26th International Conference, Prague, Czech Republic, February 19-22, 2013. Proceedings / Hana Kubátová [and others] (eds.).
Architecture of computing systems - ARCS 2013 : 26th International Conference, Prague, Czech Republic, February 19-22, 2013. Proceedings / Hana Kubátová [and others] (eds.).
Creatore [ARCS (Conference) (26th : 2013 : Prague, Czech Republic)]
Estensione 1 online resource.
Disciplina 004.2/2
Accesso persona Kubátová, Hana
Genere/Forma Congresses
Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Computer network architectures
Software engineering
Operating systems (Computers)
Information storage and retrieval systems
Computer System Implementation
Information Systems Applications (incl. Internet)
ISBN 9783642364242
3642364241
3642364233
9783642364235
Classificazione 54.31
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Unstructured Termination Detection Algorithm Using Gossip in Cloud Computing Environments / JongBeom Lim, Kwang-Sik Chung, Joon-Min Gil -- Power Monitoring for Mixed-Criticality on a Many-Core Platform / Boris Motruk, Jonas Diemer, Rainer Buchty -- On Confident Task-Accurate Performance Estimation / Yang Xu, Bo Wang, Rafael Rosales -- Iwazaru: The Byzantine Sequencer / Maciej Zbierski -- Exploiting Thermal Coupling Information in MPSoC Dynamic Thermal Management / Simone Corbetta, William Fornaciari -- A Multi-core Memory Organization for 3-D DRAM as Main Memory / Jared Sherman, Krishna Kavi, Brandon Potter -- Synthetic Aperture Radar Data Processing on an FPGA Multi-core System / Pascal Schleuniger, Anders Kusk, Jørgen Dall -- Virtual Register Renaming / Mageda Sharafeddine, Haitham Akkary -- Load-Adaptive Monitor-Driven Hardware for Preventing Embedded Real-Time Systems from Overloads Caused by Excessive Interrupt Rates / Josef Strnadel -- Producer-Consumer: The Programming Model for Future Many-Core Processors / Arnau Prat-Pérez, David Dominguez-Sal.
A Highly Dependable Self-adaptive Mixed-Signal Multi-core System-on-Chip / Benjamin Betting, Julius von Rosen -- Inter-warp Instruction Temporal Locality in Deep-Multithreaded GPUs / Ahmad Lashgar, Amirali Baniasadi -- GALS-CMP: Chip-Multiprocessor for GALS Embedded Systems / Muhammad Nadeem, HeeJong Park, Zhenmin Li -- HW/SW Tradeoffs for Dynamic Message Scheduling in Controller Area Network (CAN) / Tobias Ziermann, Zoran Salcic -- A Data-Driven Approach for Executing the CG Method on Reconfigurable High-Performance Systems / Fabian Nowak, Ingo Besenfelder -- Custom Reconfigurable Architecture Based on Virtex 5 Lookup Tables / Rico Backasch, Christian Hochberger -- Profiling Energy Consumption of I/O Functions in Embedded Applications / Shiao-Li Tsao, Cheng-Kun Yu, Yi-Hsin Chang -- An Application-Aware Cache Replacement Policy for Last-Level Caches / Tripti S. Warrier, B. Anupama -- Deploying Hardware Locks to Improve Performance and Energy Efficiency of Hardware Transactional Memory / Epifanio Gaona, José L. Abellán.
Self-adaptation for Mobile Robot Algorithms Using Organic Computing Principles / Jan Hartmann, Walter Stechele, Erik Maehle -- Self-virtualized CAN Controller for Multi-core Processors in Real-Time Applications / Christian Herber, Andre Richter -- Shrinking L1 Instruction Caches to Improve Energy-Delay in SMT Embedded Processors / Alexandra Ferrerón-Labari, Marta Ortín-Obón -- Arithmetic Unit for Computations in GF(p) with the Left-Shifting Multiplicative Inverse Algorithm / Josef Hlaváč, Róbert Lórencz -- HW-OSQM: Reducing the Impact of Event Signaling by Hardware-Based Operating System Queue Manipulation / Stefan Wallentowitz, Thomas Wild -- Comparison of GPU and FPGA Implementation of SVM Algorithm for Fast Image Segmentation / Marcin Pietron, Maciej Wielgosz -- Automatic Floorplanning and Interface Synthesis of Island Style Reconfigurable Systems with GoAhead / Christian Beckhoff, Dirk Koch -- Separable 2D Convolution with Polymorphic Register Files / Cătălin B. Ciobanu, Georgi N. Gaydadjiev -- Architecture of a Parallel MOSFET Parameter Extraction System / Tomáš Zahradnický, Róbert Lórencz -- Predictable Two-Level Bus Arbitration for Heterogeneous Task Sets / Roman Bourgade, Christine Rochange.
Record Nr. NYU-004390464
[ARCS (Conference) (26th : 2013 : Prague, Czech Republic)]  
Materiale a stampa
Lo trovi qui: New York University
Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings / Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi (eds.).
Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings / Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi (eds.).
Creatore [IFIP TC11 International Conference on Information Security (28th : 2013 : Auckland, N.Z.)]
Estensione 1 online resource (xiii, 436 pages) : illustrations.
Disciplina 005.8
Accesso persona Janczewski, Lech, 1943-editor
Wolfe, Henry B., editor.
Shenoi, Sujeet, editor
Genere/Forma Congresses
Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Computers and Society
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
ISBN 9783642392184
3642392180
9783642392177
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware, authentication and authorization -- Network security/cryptography -- Software security, policy compliance and obligations -- Privacy protection -- Risk analysis and security metrics -- Social engineering -- Security management/forensics.
Record Nr. NYU-004423413
[IFIP TC11 International Conference on Information Security (28th : 2013 : Auckland, N.Z.)]  
Materiale a stampa
Lo trovi qui: New York University
Metadata and semantic research : 5th International Conference, MTSR 2011, Izmir, Turkey, October 12-14, 2011 : proceedings / Elena García-Barriocanal [and others] (eds.).
Metadata and semantic research : 5th International Conference, MTSR 2011, Izmir, Turkey, October 12-14, 2011 : proceedings / Elena García-Barriocanal [and others] (eds.).
Creatore [International Conference on Metadata and Semantics Research (5th : 2011 : İzmir, Turkey)]
Estensione 1 online resource (xviii, 546 pages) : illustrations (some color).
Disciplina 025.042/7
Accesso persona García-Barriocanal, Elena
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Database management
Data mining
Information storage and retrieval systems
Artificial intelligence
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Artificial Intelligence (incl. Robotics)
Data Mining and Knowledge Discovery
ISBN 9783642247316
3642247318
9783642247309
364224730X
Classificazione 06.64
54.69
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004371798
[International Conference on Metadata and Semantics Research (5th : 2011 : İzmir, Turkey)]  
Materiale a stampa
Lo trovi qui: New York University
Informatics engineering and information science : International Conference, ICIEIS 2011, Kuala Lumpur, Malaysia, November 14-16, 2011, proceedings. Part III / Azizah Abd Manaf [and others] (eds.).
Informatics engineering and information science : International Conference, ICIEIS 2011, Kuala Lumpur, Malaysia, November 14-16, 2011, proceedings. Part III / Azizah Abd Manaf [and others] (eds.).
Creatore [ICIEIS 2011 (2011 : Kuala Lumpur, Malaysia)]
Estensione 1 online resource (xxvi, 717 pages) : color illustrations.
Disciplina 004
Accesso persona Azizah Abd Manaf
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Computer software
Database management
Information storage and retrieval systems
Artificial intelligence
Algorithm Analysis and Problem Complexity
Information Storage and Retrieval
ISBN 9783642254628
3642254624
9783642254611
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004372490
[ICIEIS 2011 (2011 : Kuala Lumpur, Malaysia)]  
Materiale a stampa
Lo trovi qui: New York University
Assurances for self-adaptive systems : principles, models, and techniques / Javier Cámara [and others] (eds.).
Assurances for self-adaptive systems : principles, models, and techniques / Javier Cámara [and others] (eds.).
Estensione 1 online resource.
Disciplina 005.1
Accesso persona Cámara, Javier
Genere/Forma Electronic books
Llibres electrònics
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Logic design
Logics and Meanings of Programs
ISBN 9783642362491
3642362494
3642362486
9783642362484
Classificazione 54.21
54.31
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Formal Verification -- Model Checking Adaptive Software with Featured Transition Systems / Maxime Cordy, Andreas Classen, Patrick Heymans, Axel Legay, Pierre-Yves Schobbens -- Probabilistic Verification at Runtime for Self-Adaptive Systems / Antonio Filieri, Giordano Tamburrelli -- Verification of a Self-configuration Protocol for Distributed Applications in the Cloud / Gwen Salaün, Xavier Etchevers, Noel De Palma, Fabienne Boyer, Thierry Coupaye -- Formal Modeling and Verification of Self-* Systems Based on Observer/Controller-Architectures / Florian Nafz, Jan-Philipp Steghöfer, Hella Seebach, Wolfgang Reif -- Timed Hazard Analysis of Self-healing Systems / Claudia Priesterjahn, Dominik Steenken, Matthias Tichy -- Models and Middleware -- Model-Driven Development of Safe Self-optimizing Mechatronic Systems with MechatronicUML / Holger Giese, Wilhelm Schäfer -- Model-Based Reasoning for Self-Adaptive Systems -- Theory and Practice / Gerald Steinbauer, Franz Wotawa -- Achieving Self-adaptation through Dynamic Group Management / Luciano Baresi, Sam Guinea, Panteha Saeedi -- Failure Prediction -- Accurate Proactive Adaptation of Service-Oriented Systems / Andreas Metzger, Osama Sammodi, Klaus Pohl -- Failure Avoidance in Configurable Systems through Feature Locality / Brady J. Garvin, Myra B. Cohen, Matthew B. Dwyer -- Assurance Techniques -- Emerging Techniques for the Engineering of Self-Adaptive High-Integrity Software / Radu Calinescu -- Assurance of Self-adaptive Controllers for the Cloud / Alessio Gambi, Giovanni Toffetti, Mauro Pezzè.
Record Nr. NYU-004390151
Materiale a stampa
Lo trovi qui: New York University