Sciweavers

5630 search results - page 197 / 1126
» Computability in Specification
Sort
View
SPIN
2009
Springer
15 years 11 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
AISM
2004
15 years 6 months ago
Need to Know: Security or Liability?
The `Need to Know' concept is often quoted but rarely defined in the literature. In general the principle directs that unless an individual has a specific reason to have acce...
Christopher Bolan
ISORC
2008
IEEE
15 years 11 months ago
The Complexity Challenge in Embedded System Design
The specific constraints that must be satisfied by embedded systems, such as timeliness, energy efficiency of battery-operated devices, dependable operation in safety-relevant sce...
Hermann Kopetz
123
Voted
DAC
2001
ACM
16 years 5 months ago
SoC Integration of Reusable Baseband Bluetooth IP
This presentation will give a list of design criteria an ASIC Design house need to look in the process of deciding to take the complex Bluetooth specification and implement everyt...
Barry Clark, Torbjörn Grahm
AUTOMATICA
2008
76views more  AUTOMATICA 2008»
15 years 5 months ago
Structured semidefinite programs for the control of symmetric systems
In this paper we show how the symmetry present in many linear systems can be exploited to significantly reduce the computational effort required for controller synthesis. This app...
Randy Cogill, Sanjay Lall, Pablo A. Parrilo