Sciweavers

3119 search results - page 316 / 624
» Abstract Requirement Analysis in Multiagent System Design
Sort
View
NSDI
2008
15 years 7 months ago
Designing and Implementing Malicious Hardware
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chri...
ECMDAFA
2008
Springer
97views Hardware» more  ECMDAFA 2008»
15 years 6 months ago
Model-Driven Security in Practice: An Industrial Experience
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...
149
Voted
CONCUR
1999
Springer
15 years 9 months ago
Validating Firewalls in Mobile Ambients
Abstract. The ambient calculus is a calculus of computation that allows active processes (mobile ambients) to move between sites. A firewall is said to be protective whenever it d...
Flemming Nielson, Hanne Riis Nielson, René ...
NPC
2004
Springer
15 years 10 months ago
Accurate Emulation of Wireless Sensor Networks
Abstract. Wireless sensor networks (WSNs) have a wide range of useful, datacentric applications, and major techniques involved in these applications include in-network query proces...
Hejun Wu, Qiong Luo, Pei Zheng, Bingsheng He, Lion...
AGILEDC
2005
IEEE
15 years 10 months ago
Experiences Integrating Sophisticated User Experience Design Practices into Agile Processes
Most significant software processes involve a wide range of disciplines, from programming to testing, and from documentation to database development. Unfortunately, agile processe...
Paul Hodgetts