Sciweavers

7080 search results - page 368 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
IM
2003
15 years 5 months ago
Multiple Authorization - A Model and Architecture for Increased, Practical Security
: Security of systems and management infrastructure is crucial for a successful, reliable and safe use. Most currently deployed systems are based on simple subject/object-relations...
Gerald Vogt
IEEEARES
2006
IEEE
15 years 10 months ago
E-voting: Dependability Requirements and Design for Dependability
Elections are increasingly dependent on computers and telecommunication systems. Such “E-voting” schemes create socio-technical systems (combinations of technology and human o...
Jeremy Bryans, Bev Littlewood, Peter Y. A. Ryan, L...
ASPDAC
2005
ACM
130views Hardware» more  ASPDAC 2005»
15 years 6 months ago
Stability analysis of active clock deskewing systems using a control theoretic approach
— In this paper, a methodology for analyzing closed loop clock distribution and active deskewing networks is proposed. An active clock distribution and deskewing network is model...
Vinil Varghese, Tom Chen, Peter Young
IAT
2003
IEEE
15 years 9 months ago
A Possible Approach to the Development of Robotic Multi-Agent Systems
The design of a an agent system for robotics is a problem that involves aspects coming from many different disciplines (robotics, artificial intelligence, computer vision, softwa...
Massimo Cossentino, Luca Sabatucci, Antonio Chella
157
Voted
COMPSAC
2010
IEEE
15 years 1 months ago
A Consistency Model for Identity Information in Distributed Systems
In distributed IT systems, replication of information is commonly used to strengthen the fault tolerance on a technical level or the autonomy of an organization on a business level...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...