This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...
Enterprise resource planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Annual maintenance costs approximate 25% of initial ...
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
The amount of electronics in vehicles is growing quickly, thus systems are becoming increasingly complex which makes the engineering of these software intensive systems more and m...
In this paper we attempt to give an account of reasoning with legal cases contextualised within a general theory of persuasion in practical reasoning. We begin by presenting our g...
Katie Greenwood, Trevor J. M. Bench-Capon, Peter M...