Academic literature on the topic 'Software TPM'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software TPM.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Software TPM"
GU, Liang, Yao GUO, Hua WANG, Yan-Zhen ZOU, Bing XIE, and Wei-Zhong SHAO. "Runtime Software Trustworthiness Evidence Collection Mechanism Based on TPM." Journal of Software 21, no. 2 (2010): 373–87. http://dx.doi.org/10.3724/sp.j.1001.2010.03789.
Full textAndriyono, Dimas Irwan Aji, Ahmad Fitriansyah, and Eka Satryawati. "Rancang Bangun Aplikasi Total Productive Maintenance (TPM) Berbasis Android." Jurnal Teknologi Informatika dan Komputer 6, no. 2 (2020): 112–22. http://dx.doi.org/10.37012/jtik.v6i2.235.
Full textZhenLong Du, XiaoLi Li, YanWen Guo, and Kangkang Shen. "Ensemble of Trusted Firmware Services based on TPM." International Journal of Digital Content Technology and its Applications 5, no. 3 (2011): 175–84. http://dx.doi.org/10.4156/jdcta.vol5.issue3.17.
Full textChamtitigul, Nattaya, and Weining Li. "How the Team Norm of Information Exchange and Team Information Processing Affects Team Performance in Software Development Projects?" Malaysian Journal of Social Sciences and Humanities (MJSSH) 6, no. 5 (2021): 95–102. http://dx.doi.org/10.47405/mjssh.v6i5.792.
Full textDeFranco, Joanna F., and Phillip Laplante. "A software engineering team research mapping study." Team Performance Management: An International Journal 24, no. 3/4 (2018): 203–48. http://dx.doi.org/10.1108/tpm-08-2017-0040.
Full textKAKEI, Shohei, Masami MOHRI, Yoshiaki SHIRAISHI, and Masakatu MORII. "SSL Client Authentication with TPM." IEICE Transactions on Information and Systems E99.D, no. 4 (2016): 1052–61. http://dx.doi.org/10.1587/transinf.2015cyp0012.
Full textJen-Liang, Cheng, Chen Wei-Yu, Wu Dai-Ye, Chen Kuang-Chi, and Zhang Hong-Wei. "EMULATING TRUSTED PLATFORM MODULE 2.0 ON RASPBERRY PI 2." International Journal of Security, Privacy and Trust Management ( IJSPTM ) 9, no. 3 (2020): 1–11. https://doi.org/10.5281/zenodo.4013110.
Full textShah, Shakir-Ullah, Jamil Ahmad, and Najeeb-ur Rehman. "Design and Implementation of Inter-operable and Secure Agent Migration Protocol." International Arab Journal of Information Technology 17, no. 4 (2020): 461–70. http://dx.doi.org/10.34028/iajit/17/4/4.
Full textOroye, Olufemi Adebayo, Bamisaye Olufemi Sylvester, and Peter Kayode Farayibi. "Total productive maintenance and companies performance: a case study of fast moving consumer goods companies." Jurnal Sistem dan Manajemen Industri 6, no. 1 (2022): 23–32. http://dx.doi.org/10.30656/jsmi.v6i1.4185.
Full textMcNamara, Thomas P., and Christopher F. Blanford. "A sensitivity metric and software to guide the analysis of soft films measured by a quartz crystal microbalance." Analyst 141, no. 10 (2016): 2911–19. http://dx.doi.org/10.1039/c6an00143b.
Full textDissertations / Theses on the topic "Software TPM"
Andersson, Marcus, and Alexander Nilsson. "Improving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected Devices." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3994.
Full textFaxö, Elias. "Trusted terminal-based systems." Thesis, Linköpings universitet, Institutionen för systemteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69589.
Full textClark, Paul C., Cynthia E. Irvine, Timothy E. Levin, Thuy D. Nguyen, and Timothy M. Vidas. "SecureCore software architecture trusted path application (TPA) requirements." Monterey, California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/24396.
Full textMustafa, Ghulam. "Comparing Kanban, 5S and TPS from a software engineering perspective." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107080.
Full textLakshminarayanan, R. "TriSL: A Software Architecture Description Language and Environment." Thesis, Indian Institute of Science, 1999. https://etd.iisc.ac.in/handle/2005/87.
Full textLakshminarayanan, R. "TriSL: A Software Architecture Description Language and Environment." Thesis, Indian Institute of Science, 1999. http://hdl.handle.net/2005/87.
Full textFrey, Tim [Verfasser], Gunter [Akademischer Betreuer] Saake, and Klaus [Akademischer Betreuer] Turowski. "Hypermodelling : next level software engineering with data warehouses / Tim Frey. Betreuer: Gunter Saake ; Klaus Turowski." Magdeburg : Universitätsbibliothek, 2013. http://d-nb.info/1054420114/34.
Full textAlluri, Veerendra Bhargav. "MULTIPLE CHANNEL COHERENT AMPLITUDE MODULATED (AM) TIME DIVISION MULTIPLEXING (TDM) SOFTWARE DEFINED RADIO (SDR) RECEIVER." UKnowledge, 2008. http://uknowledge.uky.edu/gradschool_theses/499.
Full textLange, Tim Felix Verfasser], Joost-Pieter [Akademischer Betreuer] [Katoen, Georg [Akademischer Betreuer] Weissenbacher, and Martin R. [Akademischer Betreuer] Neuhäußer. "IC3 software model checking / Tim Felix Lange ; Joost-Pieter Katoen, Georg Weissenbacher, Martin R. Neuhäußer." Aachen : Universitätsbibliothek der RWTH Aachen, 2018. http://d-nb.info/1191188965/34.
Full textLange, Tim Felix [Verfasser], Joost-Pieter [Akademischer Betreuer] Katoen, Georg Akademischer Betreuer] Weissenbacher, and Martin R. [Akademischer Betreuer] [Neuhäußer. "IC3 software model checking / Tim Felix Lange ; Joost-Pieter Katoen, Georg Weissenbacher, Martin R. Neuhäußer." Aachen : Universitätsbibliothek der RWTH Aachen, 2018. http://nbn-resolving.de/urn:nbn:de:101:1-2019072306045089374670.
Full textBooks on the topic "Software TPM"
TFM 2009 (2009 Eindhoven, Netherlands). Teaching formal methods: Second international conference, TFM 2009, Eindhoven, the Netherlands, November 2-6, 2009, proceedings. Springer, 2009.
Find full textUnited States. National Aeronautics and Space Administration. and United States. Army Aviation Systems Command., eds. Man-machine Integration Design and Analysis System (MIDAS), Task Loading Model (TLM), experimental and software detailed design report. National Aeronautics and Space Administration, 1994.
Find full textUnited States. National Aeronautics and Space Administration. and United States. Army Aviation Systems Command., eds. Man-machine Integration Design and Analysis System (MIDAS), Task Loading Model (TLM), experimental and software detailed design report. National Aeronautics and Space Administration, 1994.
Find full textUnited States. National Aeronautics and Space Administration. and United States. Army Aviation Systems Command., eds. Man-machine Integration Design and Analysis System (MIDAS), Task Loading Model (TLM), experimental and software detailed design report. National Aeronautics and Space Administration, 1994.
Find full textNambiar, Raghunath. Selected Topics in Performance Evaluation and Benchmarking: 4th TPC Technology Conference, TPCTC 2012, Istanbul, Turkey, August 27, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.
Find full textNambiar, Raghunath. Performance Evaluation and Benchmarking: First TPC Technology Conference, TPCTC 2009, Lyon, France, August 24-28, 2009, Revised Selected Papers. Springer-Verlag Berlin Heidelberg, 2009.
Find full textMeikel, Poess, and SpringerLink (Online service), eds. Topics in Performance Evaluation, Measurement and Characterization: Third TPC Technology Conference, TPCTC 2011, Seattle, WA, USA, August 29-September 3, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textHölzer, Michael. Quality management with SAP R/3: Making it work for your business. SAP Press/Addison-Wesley, 2001.
Find full textNeri de Souza, Francislê, and Dayse Neri de Souza. Como a Tecnologia Poderia ser Aplicada para a Análise Qualitativa com Base na Teoria Fundamentada (Grounded Theory)? Ludomedia, 2022. http://dx.doi.org/10.36367/ntqr.10.2022.e537.
Full textTaylor, Don, Jim Mischel, and Tim Gentry. Kylix Power Solutions with Don Taylor, Jim Mischel, & Tim Gentry. Coriolis Group Books, 2001.
Find full textBook chapters on the topic "Software TPM"
Arthur, Will, David Challener, and Kenneth Goldman. "TPM Software Stack." In A Practical Guide to TPM 2.0. Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6584-9_7.
Full textZiani, Yani, Nikolai Kosmatov, Frédéric Loulergue, Daniel Gracia Pérez, and Téo Bernier. "Towards Formal Verification of a TPM Software Stack." In iFM 2023. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47705-8_6.
Full textPirker, Martin, and Johannes Winter. "Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform." In Trust and Trustworthy Computing. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38908-5_8.
Full textZiani, Yani, Nikolai Kosmatov, Frédéric Loulergue, and Daniel Gracia Pérez. "Runtime Verification for High-Level Security Properties: Case Study on the TPM Software Stack." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-72044-4_5.
Full textMuñoz, Antonio, Aristeidis Farao, Jordy Ryan Casas Correia, and Christos Xenakis. "ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM)." In Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3_9.
Full textAfroozeh, Ali, Jean-Christophe Bach, Mark van den Brand, et al. "Island Grammar-Based Parsing Using GLL and Tom." In Software Language Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36089-3_13.
Full textMellis, Werner, Georg Herzwurm, and Dirk Stelzer. "Kundenorientierung durch Software Customer Value Management (SCVM)." In TQM der Softwareentwicklung. Vieweg+Teubner Verlag, 1998. http://dx.doi.org/10.1007/978-3-322-90534-5_5.
Full textMellis, Werner, Georg Herzwurm, and Dirk Stelzer. "Kundenorientierung durch Software Customer Value Management (SCVM)." In TQM der Softwareentwicklung. Vieweg+Teubner Verlag, 1996. http://dx.doi.org/10.1007/978-3-663-13902-7_5.
Full textTraulsen, Claus, Jérôme Cornet, Matthieu Moy, and Florence Maraninchi. "A SystemC/TLM Semantics in Promela and Its Possible Applications." In Model Checking Software. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73370-6_14.
Full textPinto, Miguel, Marcelo Gonçalves, Paolo Masci, and José Creissac Campos. "TOM: A Model-Based GUI Testing Framework." In Formal Aspects of Component Software. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68034-7_9.
Full textConference papers on the topic "Software TPM"
Sparks, Hailey, and Krishnendu Ghosh. "Discovery of Evolving Relationships of Software Vulnerabilities." In 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA). IEEE, 2024. https://doi.org/10.1109/tps-isa62245.2024.00045.
Full textKholoosi, M. Mehdi, M. Ali Babar, and Roland Croft. "A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality." In 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA). IEEE, 2024. https://doi.org/10.1109/tps-isa62245.2024.00022.
Full textAllen, Justin, and Geoff Sanders. "BobGAT: Towards Inferring Software Bill of Behavior with Pre-Trained Graph Attention Networks." In 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA). IEEE, 2024. https://doi.org/10.1109/tps-isa62245.2024.00047.
Full textDemarest, J., B. Austin, L. Tierney, and Z. Martin. "Targeted TEM SRAM-Like Analysis Without Delayering." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0079.
Full textJünger, Lukas, Jasmin Jahic, and Nils Bosbach. "Tutorial: Full System Simulation with SystemC TLM-2.0 and the Arm Fast Models." In 2025 IEEE 22nd International Conference on Software Architecture Companion (ICSA-C). IEEE, 2025. https://doi.org/10.1109/icsa-c65153.2025.00033.
Full textHuang, Songhua, Jiang Cai, Yi Kan, Heng Wang, and Hao Huang. "Trust Model Based on TPM for Network Mobility." In 2010 International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE, 2010. http://dx.doi.org/10.1109/cise.2010.5676899.
Full textLi, Dawei, Yingpeng Zhang, Jian Cui, et al. "Remote Audit Scheme of Embedded Device Software Based on TPM." In 2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). IEEE, 2022. http://dx.doi.org/10.1109/bigdatasecurityhpscids54978.2022.00021.
Full textWagan, Asif Ali, Bilal Munir Mughal, and Halabi Hasbullah. "VANET Security Framework for Trusted Grouping Using TPM Hardware." In 2010 Second International Conference on Communication Software and Networks. IEEE, 2010. http://dx.doi.org/10.1109/iccsn.2010.115.
Full textKARIM, ABOUELMEHDI, AHMED BENTAJER, EL AMRANI, EL FEZAZI, and HEDABOU MUSTAPHA. "Enhancing Software Piracy And Integrity Protection In Cloud Computing With TPM." In Third International Conference on Advances in Information Processing and Communication Technology - IPCT 2015. Institute of Research Engineers and Doctors, 2015. http://dx.doi.org/10.15224/978-1-63248-077-4-13.
Full textXu, Mingdi, Jian He, Bo Zhang, and Huanguo Zhang. "A New Data Protecting Scheme Based on TPM." In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.276.
Full textReports on the topic "Software TPM"
Fu, Gongkang, and Gabriel Bryk. BrM Quantity-Based Bridge Element Deterioration/Improvement Modeling and Software Tools. Illinois Center for Transportation, 2024. http://dx.doi.org/10.36501/0197-9191/24-005.
Full textFonseca, William D'Andrea, Márcio Avelar, Roberto Aizik Tenenbaum, Júlio Torres, and Eric Brandão. Simulações de Acústica de Salas desenvolvidas nas universidades do Brasil. Revista Acústica &Vibrações, 2021. http://dx.doi.org/10.55753/aev.v36e53.139.
Full textChristensen, C., R. Anderson, S. Horowitz, A. Courtney, and J. Spencer. BEopt(TM) Software for Building Energy Optimization: Features and Capabilities. Office of Scientific and Technical Information (OSTI), 2006. http://dx.doi.org/10.2172/891598.
Full textKemper, Bart. Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities. SAE International, 2023. http://dx.doi.org/10.4271/epr2023028.
Full textAbdul Hamid, Umar Zakir. Privacy for Software-defined Battery Electric Vehicles. SAE International, 2024. http://dx.doi.org/10.4271/epr2024012.
Full textEastman, Brittany. Facial Recognition Software and Privacy Law in Transportation Technology. SAE International, 2024. http://dx.doi.org/10.4271/epr2024011.
Full textGoswami, Partha. The Software-defined Vehicle: Its Current Trajectory and Execution Challenges. SAE International, 2024. http://dx.doi.org/10.4271/epr2024027.
Full textAbdul Hamid, Umar Zakir. Product Governance and Management for Software-defined Battery Electric Vehicles. SAE International, 2024. http://dx.doi.org/10.4271/epr2024025.
Full textPowell, Alan. Why How and When did GTAP Happen? What has it Achieved? Where is it Heading? GTAP Working Paper, 2007. http://dx.doi.org/10.21642/gtap.wp38.
Full textRazdan, Rahul. Product Assurance in the Age of Artificial Intelligence. SAE International, 2025. https://doi.org/10.4271/epr2025011.
Full text