Sciweavers

232 search results - page 7 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
ICSE
2009
IEEE-ACM
14 years 9 months ago
SmartTutor: Creating IDE-based interactive tutorials via editable replay
Interactive tutorials, like Eclipse's cheat sheets, are good for novice programmers to learn how to perform tasks (e.g., checking out a CVS project) in an Integrated Developm...
Ying Zhang, Gang Huang, Nuyun Zhang, Hong Mei
ITNG
2008
IEEE
15 years 6 months ago
Implementing and Validating an Environmental and Health Monitoring System
In this paper the authors describe the implementation and validation of a prototype of an environmental and health monitoring system based on a Wireless Sensor Network (WSN). The ...
Marco Messina, Yen Yang Lim, Elaine Lawrence, Don ...
KBSE
2007
IEEE
15 years 6 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
ISCAS
1999
IEEE
116views Hardware» more  ISCAS 1999»
15 years 4 months ago
A coefficient segmentation algorithm for low power implementation of FIR filters
The authors present a multiplication algorithm for low power implementation of digital filters on CMOS based digital signal processing systems. The algorithm decomposes individual...
Ahmet T. Erdogan, Tughrul Arslan
ISSA
2008
15 years 1 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche