Academic literature on the topic 'Software TPM'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software TPM.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Software TPM"

1

GU, Liang, Yao GUO, Hua WANG, Yan-Zhen ZOU, Bing XIE, and Wei-Zhong SHAO. "Runtime Software Trustworthiness Evidence Collection Mechanism Based on TPM." Journal of Software 21, no. 2 (2010): 373–87. http://dx.doi.org/10.3724/sp.j.1001.2010.03789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Andriyono, Dimas Irwan Aji, Ahmad Fitriansyah, and Eka Satryawati. "Rancang Bangun Aplikasi Total Productive Maintenance (TPM) Berbasis Android." Jurnal Teknologi Informatika dan Komputer 6, no. 2 (2020): 112–22. http://dx.doi.org/10.37012/jtik.v6i2.235.

Full text
Abstract:
Dalam era revolusi industri 4.0, perusahaan terus dituntut untuk melakukan inovasi dengan memberi kesempatan kepada seluruh karyawannya untuk turut serta membangun dan membuat ide-ide baru di perusahaan. Salah satunya adalah inovasi dalam kegiatan Total Productive Maintenance (TPM). Inovasi ini diharapkan membantu meningkatkan performa mesin – mesin produksi yang ada di perusahaan. Kendala yang dihadapi adalah minimnya pengolahan data administrasi total productive maintenance yang kurang detail menjadi salah satu masalah dalam mengembangkan inovasi di TPM. Penelitian ini akan ikut membantu menyelesaikan permasalah tersebut dengan membangun aplikasi yang dapat mengolah data TPM secara sistematis dan informatif. Penelitian ini menggunakan metode analisis software development life cycle (SDLC) untuk menganalisa sistem yang dibutuhkan mulai dari perencanaan, analisis, perancangan, penerapan, dan pemeliharaan. Sistem yang dibangun menggunakan Bahasa pemrograman Java dan SQLlite untuk databasenya, Android studio versi 3.5 untuk desain dan unified modelling language (UML) untuk pemodelan sistemnya. Hasil penelitian ini berupa aplikasi B7TPM berbasis android yang hanya bisa di akses secara internal di lingkungan perusahaan
APA, Harvard, Vancouver, ISO, and other styles
3

ZhenLong Du, XiaoLi Li, YanWen Guo, and Kangkang Shen. "Ensemble of Trusted Firmware Services based on TPM." International Journal of Digital Content Technology and its Applications 5, no. 3 (2011): 175–84. http://dx.doi.org/10.4156/jdcta.vol5.issue3.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chamtitigul, Nattaya, and Weining Li. "How the Team Norm of Information Exchange and Team Information Processing Affects Team Performance in Software Development Projects?" Malaysian Journal of Social Sciences and Humanities (MJSSH) 6, no. 5 (2021): 95–102. http://dx.doi.org/10.47405/mjssh.v6i5.792.

Full text
Abstract:
This study examines how the team norm of information exchange and team information processing affects team performance. Data were collected from 354 project teams from software development companies in Thailand. Structural Equation Modelling (SEM) was conducted to test the proposed hypotheses. The results of the study revealed that team norms of information exchange (TNM) has a significant relationship with team information processing (PRO). Team information processing positively influences team performance (TPM). Software development organisations could adopt such norms and this team process to improve software development projects performance and recognise team processes, which is essential for long-term sustainability and competitiveness.
APA, Harvard, Vancouver, ISO, and other styles
5

DeFranco, Joanna F., and Phillip Laplante. "A software engineering team research mapping study." Team Performance Management: An International Journal 24, no. 3/4 (2018): 203–48. http://dx.doi.org/10.1108/tpm-08-2017-0040.

Full text
Abstract:
Purpose The purpose of this mapping study has been performed to identify, critically analyze and synthesize research performed in the area of software engineering teams. Teams, in a general sense, have been studied extensively. But the distinctive processes that need to be executed effectively and efficiently in software engineering require a better understanding of current software engineering team research. Design/methodology/approach In this work, software engineering team publications were analyzed and the key findings of each paper that met our search inclusion criteria were synthesized. In addition, a keyword content analysis was performed to create a taxonomy to categorize each paper and evaluate the state of software engineering team research. Findings In software engineering team research, the resulting areas that are the most active are teamwork/collaboration, process/design and coordination. Clear themes of analysis have been determined to help understand how team members collaborate, factors affecting their success and interactions among all project stakeholders. In addition, themes related to tools to support team collaboration, improve the effectiveness of software engineering processes and support team coordination have been found. However, the research gaps determined from the content analysis point toward a need for more research in the area of communication and tools. Originality/value The goal of this work is to define the span of previous research in this area, create a taxonomy to categorize such research and identify open research areas to provide a clear road map for future research in the area of software engineering teams. These results, along with the key finding themes presented, will help guide future research in an area that touches all parts of the software engineering and development processes.
APA, Harvard, Vancouver, ISO, and other styles
6

KAKEI, Shohei, Masami MOHRI, Yoshiaki SHIRAISHI, and Masakatu MORII. "SSL Client Authentication with TPM." IEICE Transactions on Information and Systems E99.D, no. 4 (2016): 1052–61. http://dx.doi.org/10.1587/transinf.2015cyp0012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jen-Liang, Cheng, Chen Wei-Yu, Wu Dai-Ye, Chen Kuang-Chi, and Zhang Hong-Wei. "EMULATING TRUSTED PLATFORM MODULE 2.0 ON RASPBERRY PI 2." International Journal of Security, Privacy and Trust Management ( IJSPTM ) 9, no. 3 (2020): 1–11. https://doi.org/10.5281/zenodo.4013110.

Full text
Abstract:
A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from storage of itself and other victim computers. By adopting trusted computing technology a computer’s former health status cannot be forged. Computers can thus detect the change of health status of a hijacked computer and prevent the leakage of the secrets. As Trusted Computing Group (TCG) proposed Trusted Platform Module (TPM) specification, IBM implemented software TPM (sTPM) and utilities for engineer who wants to learn the operating principle of TPM. Meanwhile, the blooming of tiny size, but powerful, computers, e.g. Raspberry Pi 2 (Rpi2), attract ones to develop some dedicated applications on the computers. In this article, we report the verified steps for installing new sTPM version on RPi2. After the installation, we also test the functionality and evaluate the performance of the sTPM with some major TPM Commands. The real behaviour of and the traffic between the host computer and the emulated TPM can thus be learned easily.
APA, Harvard, Vancouver, ISO, and other styles
8

Shah, Shakir-Ullah, Jamil Ahmad, and Najeeb-ur Rehman. "Design and Implementation of Inter-operable and Secure Agent Migration Protocol." International Arab Journal of Information Technology 17, no. 4 (2020): 461–70. http://dx.doi.org/10.34028/iajit/17/4/4.

Full text
Abstract:
Mobile agent technology is an active research topic and has found its uses in various diverse areas ranging from simple personal assistance to complex distributed big data systems. Its usage permits offline and autonomous execution as compared to classical distributed systems. The free roaming nature of agents makes it prone to several security threats during its transit state, with an added overhead in its interoperability among different types of platforms. To address these problems, both software and hardware based approaches have been proposed to ensure protection at various transit points. However, these approaches do not ensure interoperability and protection to agents during transit over a channel, simultaneously. In this regard, an agent requires a trustworthy, interoperable, and adaptive protocol for secure migration. In this paper, to answer these research issues, we first analyse security flaws in existing agent protection frameworks. Second, we implemented a novel migration architecture which is: 1) fully inter-operable compliance to the Foundation for Intelligent Physical Agents (FIPA) and 2) trustworthy based on Computing Trusted Platform Module (TPM). The proposed approach is validated by testing on software TPM of IBM, JSR321, and jTPMTools as TPM and Trusted Computing Software Stack (TSS) interfaces, JADE-agent framework and 7Mobility Service (JIPMS). Validation is also performed on systems bearing physical TPM-chips. Moreover, some packages of JIPMS are also modified by embedding our proposed approach into their functions. Our performance results show that our approach merely adds an execution overhead during the binding and unbinding phases
APA, Harvard, Vancouver, ISO, and other styles
9

Oroye, Olufemi Adebayo, Bamisaye Olufemi Sylvester, and Peter Kayode Farayibi. "Total productive maintenance and companies performance: a case study of fast moving consumer goods companies." Jurnal Sistem dan Manajemen Industri 6, no. 1 (2022): 23–32. http://dx.doi.org/10.30656/jsmi.v6i1.4185.

Full text
Abstract:
TPM implementation by FMCG firms in Ado/Ota industrial hub of Ogun State Nigeria was investigated, and its influence on the firm's performance was analyzed. Primary data were collected through the administration of an online questionnaire. A total number of 98 respondents participated in this research. The analysis was conducted through descriptive analysis and structural equation model (SEM) using a smart partial least square (PLS) software. It was observed that TPM implementation had a positive influence on firms' performance. The descriptive analysis. It noted that most firms explored in this study had implemented TPM. It implies that above ninety percent of companies in the industrial hub are practicing TPM. The data employed in this research are limited to those obtained from FMCG firms in Ado/Ota in Ogun State, Nigeria. However, this study's findings can represent other firms in other locations where TPM is practiced. This research will be helpful for FMCG firms in Nigeria, especially those in Ogun State. TPM was measured using the following indicators: 5S, Autonomous Maintenance, Kobetsu Kaizen, Planned Maintenance, Quality, Education and Training, Office TPM, and Health, Safety and Environment. Eight indicators measure The company's performance: Product Quality, Cost, Inventory, Lead Time, Processing Cycle Time, Customer Complaints, Equipment Efficiency and Overall Productivity. The research review shows that the TPM implementation significantly affects firms' sustainable performance. In addition, the result shows that local firms in the survey area are yet to key into implementing TPM practices fully.
APA, Harvard, Vancouver, ISO, and other styles
10

McNamara, Thomas P., and Christopher F. Blanford. "A sensitivity metric and software to guide the analysis of soft films measured by a quartz crystal microbalance." Analyst 141, no. 10 (2016): 2911–19. http://dx.doi.org/10.1039/c6an00143b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Software TPM"

1

Andersson, Marcus, and Alexander Nilsson. "Improving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected Devices." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3994.

Full text
Abstract:
It is common today in large corporate environments for system administrators to employ centralized systems for log collection and analysis. The log data can come from any device between smart-phones and large scale server clusters. During an investigation of a system failure or suspected intrusion these logs may contain vital information. However, the trustworthiness of this log data must be confirmed. The objective of this thesis is to evaluate the state of the art and provide practical solutions and suggestions in the field of secure logging. In this thesis we focus on solutions that do not require a persistent connection to a central log management system. To this end a prototype logging framework was developed including client, server and verification applications. The client employs different techniques of signing log entries. The focus of this thesis is to evaluate each signing technique from both a security and performance perspective. This thesis evaluates "Traditional RSA-signing", "Traditional Hash-chains"', "Itkis-Reyzin's asymmetric FSS scheme" and "RSA signing and tick-stamping with TPM", the latter being a novel technique developed by us. In our evaluations we recognized the inability of the evaluated techniques to detect so called `truncation-attacks', therefore a truncation detection module was also developed which can be used independent of and side-by-side with any signing technique. In this thesis we conclude that our novel Trusted Platform Module technique has the most to offer in terms of log security, however it does introduce a hardware dependency on the TPM. We have also shown that the truncation detection technique can be used to assure an external verifier of the number of log entries that has at least passed through the log client software.
APA, Harvard, Vancouver, ISO, and other styles
2

Faxö, Elias. "Trusted terminal-based systems." Thesis, Linköpings universitet, Institutionen för systemteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69589.

Full text
Abstract:
Trust is a concept of increasing importance in today’s information systems where information storage and generation to a higher extent is distributed among several entities throughout local or global networks. This trend in information science requires new ways to sustain the information security in the systems. This document defines trust in the context of a terminal-based system and analyzes the architecture of a distributed terminal-based system using threat modeling tools to elicit the prerequisites for trust in such a system. The result of the analysis is then converted into measures and activities that can be performed to fulfill these prerequisites. The proposed measures include hardware identification and both hardware and software attestation supported by the Trusted Computing Group standards and Trusted Platform Modules that are included in a connection handshake protocol. The proposed handshake protocol is evaluated against a practical case of a terminal-based casino system where the weaknesses of the protocol, mainly the requirement to build a system-wide Trusted Computing Base, are made evident. Proposed solutions to this problem such as minimization of the Trusted Computing Base are discussed along with the fundamental reason of the problem and the future solutions using the next generation of CPUs and Operating System kernels.
APA, Harvard, Vancouver, ISO, and other styles
3

Clark, Paul C., Cynthia E. Irvine, Timothy E. Levin, Thuy D. Nguyen, and Timothy M. Vidas. "SecureCore software architecture trusted path application (TPA) requirements." Monterey, California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/24396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mustafa, Ghulam. "Comparing Kanban, 5S and TPS from a software engineering perspective." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107080.

Full text
Abstract:
Developing high quality software is difficult. Traditional software engineering methods emphasizes on structured and linear workflow of activities methods that have been criticized due to their rigid and inflexible nature. Recently, agile software engineering approaches such as Scrum have gained popularity in the software industry. These methods emphasize flexibility, speed, transparency, and teamwork aspects. In this thesis, investigation and comparison of three modern production practices and principles done, these include; Kanban, the 5S workplace organization method and Toyota Production System (TPS). The goal has been to identity features of these production philosophies and analyzed how they might contribute to software engineering processes, particularly to improve Scrum. The study indicates that many principles from these production approaches have been implemented in Scrum. However, the Kanban, 5S and TPS principles of Visibility are just partially implemented in Scrum. Scrum overlooks many aspects of programming that need to be visualized such as code quality aspects (testing) and representations of the actual software structure under development.
APA, Harvard, Vancouver, ISO, and other styles
5

Lakshminarayanan, R. "TriSL: A Software Architecture Description Language and Environment." Thesis, Indian Institute of Science, 1999. https://etd.iisc.ac.in/handle/2005/87.

Full text
Abstract:
As the size and complexity of a software system increases, the design problem goes beyond the algorithms and data structures of the computation. Designing and specifying the overall system structure -- or software architecture -- becomes the central problem. A system's architecture provides a model of the system that hides implementation detail, allowing the architect to concentrate on the analyses and decisions that are most crucial to structuring the system to satisfy its requirements. Unfortunately, with few exceptions, current exploitation of software architecture and architectural style is informal and ad hoc. The lack of an explicit, independent characterization of architecture and architectural style significantly limits the extent to which software architecture can be exploited using current practices. Architecture Description Languages(ADL) result from a linguistic approach to the formal description of software architectures. ADLs should facilitate building of architectures, not just specification. Further, they should also address the compositionality, substitutability, and reusability issues, which are the key to successful large-scale software development. A software architecture description language with a well defined type system can facilitate compositionality, substitutability, and usability, the three keys to successful large-scale software development. Our contribution is a new software architecture description language, TriSL, which supports these features. In this talk we describe the design and implementation of TriSL and its type system. We demonstrate the power of our language and its expressiveness through case studies of real world applications.
APA, Harvard, Vancouver, ISO, and other styles
6

Lakshminarayanan, R. "TriSL: A Software Architecture Description Language and Environment." Thesis, Indian Institute of Science, 1999. http://hdl.handle.net/2005/87.

Full text
Abstract:
As the size and complexity of a software system increases, the design problem goes beyond the algorithms and data structures of the computation. Designing and specifying the overall system structure -- or software architecture -- becomes the central problem. A system's architecture provides a model of the system that hides implementation detail, allowing the architect to concentrate on the analyses and decisions that are most crucial to structuring the system to satisfy its requirements. Unfortunately, with few exceptions, current exploitation of software architecture and architectural style is informal and ad hoc. The lack of an explicit, independent characterization of architecture and architectural style significantly limits the extent to which software architecture can be exploited using current practices. Architecture Description Languages(ADL) result from a linguistic approach to the formal description of software architectures. ADLs should facilitate building of architectures, not just specification. Further, they should also address the compositionality, substitutability, and reusability issues, which are the key to successful large-scale software development. A software architecture description language with a well defined type system can facilitate compositionality, substitutability, and usability, the three keys to successful large-scale software development. Our contribution is a new software architecture description language, TriSL, which supports these features. In this talk we describe the design and implementation of TriSL and its type system. We demonstrate the power of our language and its expressiveness through case studies of real world applications.
APA, Harvard, Vancouver, ISO, and other styles
7

Frey, Tim [Verfasser], Gunter [Akademischer Betreuer] Saake, and Klaus [Akademischer Betreuer] Turowski. "Hypermodelling : next level software engineering with data warehouses / Tim Frey. Betreuer: Gunter Saake ; Klaus Turowski." Magdeburg : Universitätsbibliothek, 2013. http://d-nb.info/1054420114/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alluri, Veerendra Bhargav. "MULTIPLE CHANNEL COHERENT AMPLITUDE MODULATED (AM) TIME DIVISION MULTIPLEXING (TDM) SOFTWARE DEFINED RADIO (SDR) RECEIVER." UKnowledge, 2008. http://uknowledge.uky.edu/gradschool_theses/499.

Full text
Abstract:
It is often required in communication and navigation systems to be able to receive signals from multiple stations simultaneously. A common practice to do this is to use multiple hardware resources; a different set of resources for each station. In this thesis, a Coherent Amplitude Modulated (AM) receiver system was developed based on Software Defined Radio (SDR) technology enabling reception of multiple signals using hardware resources needed only for one station. The receiver system architecture employs Time Division Multiplexing (TDM) to share the single hardware resource among multiple streams of data. The architecture is designed so that it can be minimally modified to support any number of stations. The Verilog Hardware Description Language (HDL) was used to capture the receiver system architecture and design. The design and architecture are initially validated using HDL post-synthesis and post-implementation simulation. In addition, the receiver system architecture and design were implemented to a Xilinx Field Programmable Gate Array (FPGA) technology prototyping board for experimental testing and final validation.
APA, Harvard, Vancouver, ISO, and other styles
9

Lange, Tim Felix Verfasser], Joost-Pieter [Akademischer Betreuer] [Katoen, Georg [Akademischer Betreuer] Weissenbacher, and Martin R. [Akademischer Betreuer] Neuhäußer. "IC3 software model checking / Tim Felix Lange ; Joost-Pieter Katoen, Georg Weissenbacher, Martin R. Neuhäußer." Aachen : Universitätsbibliothek der RWTH Aachen, 2018. http://d-nb.info/1191188965/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lange, Tim Felix [Verfasser], Joost-Pieter [Akademischer Betreuer] Katoen, Georg Akademischer Betreuer] Weissenbacher, and Martin R. [Akademischer Betreuer] [Neuhäußer. "IC3 software model checking / Tim Felix Lange ; Joost-Pieter Katoen, Georg Weissenbacher, Martin R. Neuhäußer." Aachen : Universitätsbibliothek der RWTH Aachen, 2018. http://nbn-resolving.de/urn:nbn:de:101:1-2019072306045089374670.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Software TPM"

1

TFM 2009 (2009 Eindhoven, Netherlands). Teaching formal methods: Second international conference, TFM 2009, Eindhoven, the Netherlands, November 2-6, 2009, proceedings. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. National Aeronautics and Space Administration. and United States. Army Aviation Systems Command., eds. Man-machine Integration Design and Analysis System (MIDAS), Task Loading Model (TLM), experimental and software detailed design report. National Aeronautics and Space Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. National Aeronautics and Space Administration. and United States. Army Aviation Systems Command., eds. Man-machine Integration Design and Analysis System (MIDAS), Task Loading Model (TLM), experimental and software detailed design report. National Aeronautics and Space Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. National Aeronautics and Space Administration. and United States. Army Aviation Systems Command., eds. Man-machine Integration Design and Analysis System (MIDAS), Task Loading Model (TLM), experimental and software detailed design report. National Aeronautics and Space Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nambiar, Raghunath. Selected Topics in Performance Evaluation and Benchmarking: 4th TPC Technology Conference, TPCTC 2012, Istanbul, Turkey, August 27, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nambiar, Raghunath. Performance Evaluation and Benchmarking: First TPC Technology Conference, TPCTC 2009, Lyon, France, August 24-28, 2009, Revised Selected Papers. Springer-Verlag Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Meikel, Poess, and SpringerLink (Online service), eds. Topics in Performance Evaluation, Measurement and Characterization: Third TPC Technology Conference, TPCTC 2011, Seattle, WA, USA, August 29-September 3, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hölzer, Michael. Quality management with SAP R/3: Making it work for your business. SAP Press/Addison-Wesley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Neri de Souza, Francislê, and Dayse Neri de Souza. Como a Tecnologia Poderia ser Aplicada para a Análise Qualitativa com Base na Teoria Fundamentada (Grounded Theory)? Ludomedia, 2022. http://dx.doi.org/10.36367/ntqr.10.2022.e537.

Full text
Abstract:
A teoria fundamentada foi proposta na década de sessenta e, desde então, tem sido modificada e adaptada nas mais diferentes áreas de estudo e técnicas de análise qualitativa. Neste artigo, iremos propor a integração das tecnologias para a análise qualitativa mais eficaz com base nos procedimentos da teoria fundamentada (Grounded Theory, GT). Para isso, propomos a integração do software webQDA® para os procedimentos de codificação aberta, axial e seletiva da GT entre várias vantagens operacionais e analítica. Assim, iremos apresentar uma discussão teórica sobre os fundamentos da teoria fundamentada e suas variações ao longo das últimas décadas. Depois introduziremos o software webQDA® e como ele pode ser usado em sete etapas transversais as várias necessidades analíticas que utilizam os pressupostos da GT: 1º) Preparação das fontes por ciclo de análise; 2º) Codificação Aberta; 3º) Codificação Axial, 4º) Codificação Seletiva; 5ª) Depuração da Codificação Aberta através da “Pesquisa das Palavras frequentes” e “Pesquisa de Texto”; 6º) Repetição dos Passos 3 e 4 para aprofundamento da Codificação; 7º) Triangulação da Informação com as matrizes. Embora não seja o foco deste artigo, estas etapas têm sido aplicadas em diversas investigações que integram a GT com apoio do software webQDA®.
APA, Harvard, Vancouver, ISO, and other styles
10

Taylor, Don, Jim Mischel, and Tim Gentry. Kylix Power Solutions with Don Taylor, Jim Mischel, & Tim Gentry. Coriolis Group Books, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Software TPM"

1

Arthur, Will, David Challener, and Kenneth Goldman. "TPM Software Stack." In A Practical Guide to TPM 2.0. Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6584-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ziani, Yani, Nikolai Kosmatov, Frédéric Loulergue, Daniel Gracia Pérez, and Téo Bernier. "Towards Formal Verification of a TPM Software Stack." In iFM 2023. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47705-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pirker, Martin, and Johannes Winter. "Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform." In Trust and Trustworthy Computing. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38908-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ziani, Yani, Nikolai Kosmatov, Frédéric Loulergue, and Daniel Gracia Pérez. "Runtime Verification for High-Level Security Properties: Case Study on the TPM Software Stack." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-72044-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Muñoz, Antonio, Aristeidis Farao, Jordy Ryan Casas Correia, and Christos Xenakis. "ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM)." In Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Afroozeh, Ali, Jean-Christophe Bach, Mark van den Brand, et al. "Island Grammar-Based Parsing Using GLL and Tom." In Software Language Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36089-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mellis, Werner, Georg Herzwurm, and Dirk Stelzer. "Kundenorientierung durch Software Customer Value Management (SCVM)." In TQM der Softwareentwicklung. Vieweg+Teubner Verlag, 1998. http://dx.doi.org/10.1007/978-3-322-90534-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mellis, Werner, Georg Herzwurm, and Dirk Stelzer. "Kundenorientierung durch Software Customer Value Management (SCVM)." In TQM der Softwareentwicklung. Vieweg+Teubner Verlag, 1996. http://dx.doi.org/10.1007/978-3-663-13902-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Traulsen, Claus, Jérôme Cornet, Matthieu Moy, and Florence Maraninchi. "A SystemC/TLM Semantics in Promela and Its Possible Applications." In Model Checking Software. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73370-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pinto, Miguel, Marcelo Gonçalves, Paolo Masci, and José Creissac Campos. "TOM: A Model-Based GUI Testing Framework." In Formal Aspects of Component Software. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68034-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Software TPM"

1

Sparks, Hailey, and Krishnendu Ghosh. "Discovery of Evolving Relationships of Software Vulnerabilities." In 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA). IEEE, 2024. https://doi.org/10.1109/tps-isa62245.2024.00045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kholoosi, M. Mehdi, M. Ali Babar, and Roland Croft. "A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality." In 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA). IEEE, 2024. https://doi.org/10.1109/tps-isa62245.2024.00022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Allen, Justin, and Geoff Sanders. "BobGAT: Towards Inferring Software Bill of Behavior with Pre-Trained Graph Attention Networks." In 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA). IEEE, 2024. https://doi.org/10.1109/tps-isa62245.2024.00047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Demarest, J., B. Austin, L. Tierney, and Z. Martin. "Targeted TEM SRAM-Like Analysis Without Delayering." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0079.

Full text
Abstract:
Abstract In the ever-increasing complexity of today’s state-of-the-art semiconductor structures, it is desirable to seek any advantage in the fault isolation and analysis paradigm to improve time to data. This paper discusses one such improvement where it is shown to be possible to target silicon (Si) devices, their metal contacts, or any other location in the wafer stack in a SRAM test structure from metal level 7 (M7) for transmission electron microscopy (TEM) sample fabrication using a modified sample geometry, focused ion beam (FIB) software targeting tools, and planning for failure analysis at the mask design stage. Electron beam inspection data was used to drive back to the location of interest in this example. The subsequent analysis shows a silicon and oxygen rich material creating an open contact defect signature.
APA, Harvard, Vancouver, ISO, and other styles
5

Jünger, Lukas, Jasmin Jahic, and Nils Bosbach. "Tutorial: Full System Simulation with SystemC TLM-2.0 and the Arm Fast Models." In 2025 IEEE 22nd International Conference on Software Architecture Companion (ICSA-C). IEEE, 2025. https://doi.org/10.1109/icsa-c65153.2025.00033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Songhua, Jiang Cai, Yi Kan, Heng Wang, and Hao Huang. "Trust Model Based on TPM for Network Mobility." In 2010 International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE, 2010. http://dx.doi.org/10.1109/cise.2010.5676899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Dawei, Yingpeng Zhang, Jian Cui, et al. "Remote Audit Scheme of Embedded Device Software Based on TPM." In 2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). IEEE, 2022. http://dx.doi.org/10.1109/bigdatasecurityhpscids54978.2022.00021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wagan, Asif Ali, Bilal Munir Mughal, and Halabi Hasbullah. "VANET Security Framework for Trusted Grouping Using TPM Hardware." In 2010 Second International Conference on Communication Software and Networks. IEEE, 2010. http://dx.doi.org/10.1109/iccsn.2010.115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

KARIM, ABOUELMEHDI, AHMED BENTAJER, EL AMRANI, EL FEZAZI, and HEDABOU MUSTAPHA. "Enhancing Software Piracy And Integrity Protection In Cloud Computing With TPM." In Third International Conference on Advances in Information Processing and Communication Technology - IPCT 2015. Institute of Research Engineers and Doctors, 2015. http://dx.doi.org/10.15224/978-1-63248-077-4-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xu, Mingdi, Jian He, Bo Zhang, and Huanguo Zhang. "A New Data Protecting Scheme Based on TPM." In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.276.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Software TPM"

1

Fu, Gongkang, and Gabriel Bryk. BrM Quantity-Based Bridge Element Deterioration/Improvement Modeling and Software Tools. Illinois Center for Transportation, 2024. http://dx.doi.org/10.36501/0197-9191/24-005.

Full text
Abstract:
This study reviewed the state of the art and practice in bridge element deterioration / improvement modeling. It also developed a new and practical method for such modeling using element quantities in BrM inspection records along with bridge age. For reliable forecasting, this method uses these quantities directly to determine transition probability matrices (TPMs). The example TPMs were found age-dependent for the do-nothing case. Results show that this approach is effective in forecasting the bridge element life. Condition improvement TPMs were also similarly derived from the quantity evolution for consistency. Examples of renewal construction work are deck overlay of micro-silica concrete, steel beam repainting, bridge cleaning, etc. Two computer software programs in Microsoft Excel were developed to obtain TPMs for do-nothing deterioration and condition improvement. Bridge owners may use the tools to generate TPMs for any element whose inspection records are provided. As a result, TPMs can be continuously updated whenever more inspections are performed and their records are included as input to the software programs. In addition, the software tools are transparent for the user to perform expert elicitation, especially when the inspection records are questionable or unavailable. Such activity can be informatively guided by the results from the software, as illustrated by two application examples in the delivered programs. This new concept and associated tools may be applied by other bridge owners using the BrM system. Two application examples for elements 12 and 107 in the programs can be readily transplanted to other states as a starting point for application of the research products herein. They show that the age-dependent TPM is able to realistically replicate deterioration for the do-nothing case, particularly the behavior of faster deterioration while aging. They also demonstrate that TPMs for different renewal construction work are able to contrast their effectiveness, such as micro-silica overlays vs. sealing for a concrete deck.
APA, Harvard, Vancouver, ISO, and other styles
2

Fonseca, William D'Andrea, Márcio Avelar, Roberto Aizik Tenenbaum, Júlio Torres, and Eric Brandão. Simulações de Acústica de Salas desenvolvidas nas universidades do Brasil. Revista Acústica &Vibrações, 2021. http://dx.doi.org/10.55753/aev.v36e53.139.

Full text
Abstract:
Simulação em acústica de salas tem um importante papel para pesquisadores e consultores do ramo. No Brasil, existem diversas iniciativas de software para essa finalidade. Logo, nesta seção, trazemos uma pequena revisão sobre o assunto, além dos software que nasceram nas universidades brasileiras, frutos de pesquisa e desenvolvimento. Embora apresentando etapas distintas de maturidade, eles têm funcionalidades sofisticadas e profissionais, são eles RAIOS, BRASS e Trem.
APA, Harvard, Vancouver, ISO, and other styles
3

Christensen, C., R. Anderson, S. Horowitz, A. Courtney, and J. Spencer. BEopt(TM) Software for Building Energy Optimization: Features and Capabilities. Office of Scientific and Technical Information (OSTI), 2006. http://dx.doi.org/10.2172/891598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kemper, Bart. Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities. SAE International, 2023. http://dx.doi.org/10.4271/epr2023028.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">Traditional physical infrastructure increasingly relies upon software. Yet, 75% of software projects fail in budget by 46% and schedule by 82%. While other systems generally have a “responsible-in-charge” (RIC) professional, the implementation of a similar system of accountability in software is not settled. This is a major concern, as the consequences of software failure can be a matter of life-or-death. Further, there has been a 742% average annual increase in software supply chain attacks on increasingly used open-source software over the past three years, which can cost up to millions of dollars per incident.</div><div class="htmlview paragraph"><b>Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities</b> discusses the verification, validation, and uncertainty quantification needed to vet systems before implementation and the continued maintenance measures required over the lifespan of software-integrated assets. It also proposes a certified System Software Integrator role that would be responsible for public safety in traditional infrastructure.</div><div class="htmlview paragraph"><a href="https://www.sae.org/publications/edge-research-reports" target="_blank">Click here to access the full SAE EDGE</a><sup>TM</sup><a href="https://www.sae.org/publications/edge-research-reports" target="_blank"> Research Report portfolio.</a></div></div>
APA, Harvard, Vancouver, ISO, and other styles
5

Abdul Hamid, Umar Zakir. Privacy for Software-defined Battery Electric Vehicles. SAE International, 2024. http://dx.doi.org/10.4271/epr2024012.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">The integration of software-defined approaches with software-defined battery electric vehicles brings forth challenges related to privacy regulations, such as European Union’s General Data Protection Regulation and Data Act, as well as the California Consumer Privacy Act. Compliance with these regulations poses barriers for foreign brands and startups seeking entry into these markets. Car manufacturers and suppliers, particularly software suppliers, must navigate complex privacy requirements when introducing vehicles to these regions.</div><div class="htmlview paragraph"><b>Privacy for Software-defined Battery Electric Vehicles</b> aims to educate practitioners across different market regions and fields. It seeks to stimulate discussions for improvements in processes and requirements related to privacy aspects regarding these vehicles. The report covers the significance of privacy, potential vulnerabilities and risks, technical challenges, safety risks, management and operational challenges, and the benefits of compliance with privacy standards within the software-defined battery electric vehicle realm.</div><div class="htmlview paragraph"><a href="https://www.sae.org/publications/edge-research-reports" target="_blank">Click here to access the full SAE EDGE</a><sup>TM</sup><a href="https://www.sae.org/publications/edge-research-reports" target="_blank"> Research Report portfolio.</a></div></div>
APA, Harvard, Vancouver, ISO, and other styles
6

Eastman, Brittany. Facial Recognition Software and Privacy Law in Transportation Technology. SAE International, 2024. http://dx.doi.org/10.4271/epr2024011.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">Data privacy questions are particularly timely in the automotive industry as—now more than ever before—vehicles are collecting and sharing data at great speeds and quantities. Though connectivity and vehicle-to-vehicle technologies are perhaps the most obvious, smart city infrastructure, maintenance, and infotainment systems are also relevant in the data privacy law discourse.</div><div class="htmlview paragraph"><b>Facial Recognition Software and Privacy Law in Transportation Technology</b> considers the current legal landscape of privacy law and the unanswered questions that have surfaced in recent years. A survey of the limited recent federal case law and statutory law, as well as examples of comprehensive state data privacy laws, is included. Perhaps most importantly, this report simplifies the balancing act that manufacturers and consumers are performing by complying with data privacy laws, sharing enough data to maximize safety and convenience, and protecting personal information.</div><div class="htmlview paragraph"><a href="https://www.sae.org/publications/edge-research-reports" target="_blank">Click here to access the full SAE EDGE</a><sup>TM</sup><a href="https://www.sae.org/publications/edge-research-reports" target="_blank"> Research Report portfolio.</a></div></div>
APA, Harvard, Vancouver, ISO, and other styles
7

Goswami, Partha. The Software-defined Vehicle: Its Current Trajectory and Execution Challenges. SAE International, 2024. http://dx.doi.org/10.4271/epr2024027.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">Original equipment manufacturers, Tier 1 suppliers, and the rest of the value chain, including the semiconductor industry, are reshaping their product portfolios, development processes, and business models to support this transformation to software-defined vehicles (SDVs). The focus on software is rippling out through the automotive sector, forcing the industry to rethink organization, leadership, processes, and future roadmaps.</div><div class="htmlview paragraph"><b>The Software-defined Vehicle: Its Current Trajectory and Execution Challenges</b> assesses the state of SDVs and explores the potential hurdles to execution and examines the work being done in the industry. The goal is to evaluate whether the implementation of SDVs will encounter the same fate as electrification or autonomous technologies, which after some level of disillusionment, are expected to pick up momentum in a more mature way.</div><div class="htmlview paragraph"><a href="https://www.sae.org/publications/edge-research-reports" target="_blank">Click here to access the full SAE EDGE</a><sup>TM</sup><a href="https://www.sae.org/publications/edge-research-reports" target="_blank"> Research Report portfolio.</a></div></div>
APA, Harvard, Vancouver, ISO, and other styles
8

Abdul Hamid, Umar Zakir. Product Governance and Management for Software-defined Battery Electric Vehicles. SAE International, 2024. http://dx.doi.org/10.4271/epr2024025.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">In recent years, battery electric vehicles (BEVs) have experienced significant sales growth, marked by advancements in features and market delivery. This evolution intersects with innovative software-defined vehicles, which have transformed automotive supply chains, introducing new BEV brands from both emerging and mature markets. The critical role of software in software-defined battery electric vehicles (SD-BEVs) is pivotal for enhancing user experience and ensuring adherence to rigorous safety, performance, and quality standards. Effective governance and management are crucial, as failures can mar corporate reputations and jeopardize safety-critical systems like advanced driver assistance systems.</div><div class="htmlview paragraph"><b>Product Governance and Management for Software-defined Battery Electric Vehicles</b> addresses the complexities of SD-BEV product governance and management to facilitate safer vehicle deployments. By exploring these challenges, it aims to enhance internal processes and foster cross-geographical collaborations, assisting automotive product managers in integrating comprehensive considerations into product strategies and requirements.</div><div class="htmlview paragraph"><a href="https://www.sae.org/publications/edge-research-reports" target="_blank">Click here to access the full SAE EDGE</a><sup>TM</sup><a href="https://www.sae.org/publications/edge-research-reports" target="_blank"> Research Report portfolio.</a></div></div>
APA, Harvard, Vancouver, ISO, and other styles
9

Powell, Alan. Why How and When did GTAP Happen? What has it Achieved? Where is it Heading? GTAP Working Paper, 2007. http://dx.doi.org/10.21642/gtap.wp38.

Full text
Abstract:
Presented at the 10th Annual Conference on Global Economic Analysis, Purdue University, USA Team research has been much more widespread in the natural sciences than in economics. Yet when it comes to modeling an economy (especially the global economy) in detail, the quantity and range of inputs necessary makes team work the only viable option. Drawing some inspiration from Australian experience, GTAP’s founder, Tom Hertel, realized this from his Project’s inception in 1993. The data base required to model international trade flows could not have been developed without the enthusiastic cooperation of many individuals and institutions around the world. Funding GTAP’s central team at Purdue required external support. National agencies in Australia, Denmark, France, Germany, Holland, Japan, and the US are members of the supporting research consortium. The natural interest of international economic agencies led to GTAP having five such supporting agencies by 1997, which grew to ten by 2006. GTAP has striven to put the maximum feasible amount of its data, methodology and models into the public domain. It has run numerous residential intensive training courses in the use of the GTAP data and model: these have been held in the US, Europe, Africa, Asia and Latin America. The success of these courses reflects the modeling experience of the teams of course instructors and the availability of special-purpose software which allows simulations to be run without programming skill or previous knowledge of the software used. Researchers making use of GTAP have been prolific in number, and in their output. In mid April 2007, applications on the GTAP web site numbered 781. There were 366 subscribers to the GTAP data base at the end of April 2007, but the number of individuals making use of GTAP data exceeded 4,000.
APA, Harvard, Vancouver, ISO, and other styles
10

Razdan, Rahul. Product Assurance in the Age of Artificial Intelligence. SAE International, 2025. https://doi.org/10.4271/epr2025011.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">Driven by the vast consumer marketplace, the electronics megatrend has reshaped nearly every sector of society. The advancements in semiconductors and software, originally built to serve consumer demand, are now delivering significant value to non-consumer industries. Today, electronics are making inroads into traditionally conservative, safety-critical sectors such as automotive and aerospace. In doing so, electronics—now further propelled by artificial intelligence—are disrupting the functional safety architectures of these cyber-physical systems. Electronics have created the world of cyber-physical systems, raising broader concerns about the broader category of product assurance.</div><div class="htmlview paragraph"><b>Product Assurance in the Age of Artificial Intelligence</b> continues the work of previous SAE Edge Research Reports in examining open research challenges arising from this shift, particularly in automotive systems, as core electronic technologies (e.g., the combination of software and communications) have even redefined what it means to be a "product."</div><div class="htmlview paragraph"><a href="https://www.sae.org/publications/edge-research-reports" target="_blank">Click here to access the full SAE EDGE</a><sup>TM</sup><a href="https://www.sae.org/publications/edge-research-reports" target="_blank"> Research Report portfolio.</a></div></div>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!