Systems

Results: 323656



#Item
61

2016 IEEE Real-Time Systems Symposium On-Line Event-Driven Scheduling for Electric Vehicle Charging via Park-and-Charge 1

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2017-04-17 03:11:51
    62Computer architecture / Computing / System software / Software bugs / Embedded operating systems / Electrical engineering / Stack buffer overflow / FreeRTOS / Protection ring / Buffer overflow protection / Internet of things / Memory protection

    Poster: EPOXY—Enabling Robust Protection for Bare-metal Systems Abraham A. Clements∗ , Naif Saleh Almakhdhub† , Khaled S. Saab‡ , Prashast Srivastava† , Jinkyu Koo† , Saurabh Bagchi† , Mathias Payer† ∗

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 19:44:12
    63Mathematics / Mathematical analysis / Temporal logic / Computation tree logic / Logic in computer science / Distribution / Symbol / Constructible universe / Linear temporal logic / Craig interpolation

    Automatic Verification of Competitive Stochastic Systems Taolue Chen, Vojtˇech Forejt, Marta Kwiatkowska, David Parker, and Aistis Simaitis Department of Computer Science, University of Oxford, Oxford, UK

    Add to Reading List

    Source URL: qav.comlab.ox.ac.uk

    Language: English - Date: 2012-01-06 05:40:55
    64Automotive industry / Transport / Economy / Parachuting / Product testing / Safety engineering / Joyson Safety Systems / Mazda / Robert Bosch GmbH / ZF Friedrichshafen / Airbag / Fraunhofer Society

    14th International Symposium and accompanying Exhibition on Sophisticated Car Safety Systems Mannheim, Germany

    Add to Reading List

    Source URL: www.ict.fraunhofer.de

    Language: English - Date: 2018-10-26 03:42:36
    65Algebra / Mathematics / Numerical linear algebra / Equations / Linear algebra / Hidden Field Equations / Multivariate cryptography / Gaussian elimination / Recurrence relation / Equation solving / APMonitor / BCD

    Implementing Joux-Vitse’s Crossbred Algorithm for Solving MQ Systems over F2 on GPUs Ruben Niederhagen1 , Kai-Chun Ning2 , and Bo-Yin Yang3 1 2

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2018-05-02 19:49:44
    66Carsharing / Sustainable transport / Transport / Mobility car / Parking / Mobility / Car / Mobility Carsharing

    160525A Case Study catch a car EN 2spalten

    Add to Reading List

    Source URL: www.mobility-systems-and-services.com

    Language: English - Date: 2018-06-21 12:11:54
    67Carnegie Mellon University / Software Engineering Institute / Carnegie Mellon Silicon Valley / Alan Turing / Mathematics / British people / Pittsburgh

    Time-Bounded Analysis of RealTime Systems Sagar Chaki1, Arie Gurfinkel1, Ofer Strichman2, Soonho Kong1 1Software

    Add to Reading List

    Source URL: arieg.bitbucket.io

    Language: English - Date: 2018-10-19 18:15:18
    68Computer security / Computing / Computer network security / Security engineering / Information and communications technology / Crime prevention / Cryptography / National security / Virtual private network / SCADA / FBI Criminal Justice Information Services Division / Computer network

    A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman

    Add to Reading List

    Source URL: benvds.com

    Language: English - Date: 2018-09-18 11:06:16
    69Mathematics / Mathematical analysis / Analysis / Polynomials / Numerical analysis / Interpolation / Algebra / Polynomial interpolation / Affine arithmetic / Numerical integration / Lagrange polynomial / Polynomial

    Computing Flowpipe of Nonlinear Hybrid Systems with Numerical Methods Olivier Bouissou1 , Alexandre Chapoutot2 , and Samuel Mimram1 1 CEA Saclay Nano-INNOV Institut CARNOT, Gif-sur-Yvette France

    Add to Reading List

    Source URL: perso.ensta-paristech.fr

    Language: English - Date: 2013-01-16 16:02:10
    70Computer security / Security engineering / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Password / Operating system / Protection ring / Capability-based security

    The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2016-01-15 12:55:59
    UPDATE