Sciweavers

320 search results - page 24 / 64
» Completing design in use: closing the appropriation cycle
Sort
View
ESORICS
2007
Springer
15 years 8 months ago
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
Although there exist informal design guidelines and formal development support, security protocol development is time-consuming because design is error-prone. In this paper, we int...
Juan Carlos López Pimentel, Raul Monroy, Di...
VTC
2008
IEEE
142views Communications» more  VTC 2008»
15 years 8 months ago
EXIT-Chart Aided Hybrid Multiuser Detector Design for Frequency-Domain-Spread Chip-Interleaved MC-CDMA
— With the advent of EXtrinsic Information Transfer (EXIT) charts, we are capable of analyzing, predicting and visually comparing the convergence behaviours of different turbo Mu...
Lei Xu, Rong Zhang, Sheng Chen, Lajos Hanzo
SDM
2009
SIAM
204views Data Mining» more  SDM 2009»
15 years 11 months ago
Application of Bayesian Partition Models in Warranty Data Analysis.
Automotive companies are forced to continuously extend and improve their product line-up. However, increasing diversity, higher design complexity, and shorter development cycles c...
Axel Blumenstock, Christoph Schlieder, Markus M&uu...
IPPS
2007
IEEE
15 years 8 months ago
Model-Driven Performance Analysis Methodology for Distributed Software Systems
Abstract— A key enabler of the recently popularized, assemblycentric development approach for distributed real-time software systems is QoS-enabled middleware, which provides reu...
Swapna S. Gokhale, Paul J. Vandal, Aniruddha S. Go...
DT
2006
113views more  DT 2006»
15 years 1 months ago
A Platform-Based Taxonomy for ESL Design
the abstraction level at which designers express systems, enabling new levels of design reuse, and providing for design chain integration ool flows and abstraction levels. The purp...
Douglas Densmore, Roberto Passerone