×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [untrusted components]
Phil Yialelogou - Northrop Grumman Corporation - Criticality of employing deception in conventional military operations
262 views
Systems Engineering Research Taking Systems Engineering to the Next Level Cihan H Dagli, PhD Professor of Engineering Management and Systems Engineering
230 views
Securing deployment pipeline
331 views
ECE 720T5 Fall 2012 Cyber-Physical Systems Rodolfo Pellizzoni
224 views
6/2/2015EuroSys2006Page 1 Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies Lenin Singaravelu, Calton Pu, Hermann Härtig,
216 views
Option 2: The Oceanic Data Utility: Global-Scale Persistent Storage John Kubiatowicz
223 views
OceanStore Theoretical Issues and Open Problems John Kubiatowicz University of California at Berkeley
213 views
DM Rasanjalee Himali CSc8320 – Advanced Operating Systems (SECTION 2.6) FALL 2009
218 views
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen
216 views
1 Configurable Security for Scavenged Storage Systems NetSysLab The University of British Columbia Abdullah Gharaibeh with: Samer Al-Kiswany, Matei Ripeanu
215 views
DISTRIBUTED HASH TABLES Building large-scale, robust distributed applications Frans Kaashoek
[email protected]
Joint work with: H. Balakrishnan, P
217 views
ECE 720T5 Fall 2011 Cyber-Physical Systems
36 views
Next >