Sciweavers

1264 search results - page 200 / 253
» Designing Safe, Reliable Systems using Scade
Sort
View
IACR
2011
221views more  IACR 2011»
14 years 1 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
WOTUG
2007
15 years 3 months ago
A Process Oriented Approach to USB Driver Development
Abstract. Operating-systems are the core software component of many modern computer systems, ranging from small specialised embedded systems through to large distributed operating-...
Carl G. Ritson, Fred R. M. Barnes
AICCSA
2006
IEEE
137views Hardware» more  AICCSA 2006»
15 years 8 months ago
Modeling Redundancy: Quantitative and Qualitative Models
Redundancy is a system property that generally refers to duplication of state information or system function. While redundancy is usually investigated in the context of fault tole...
Ali Mili, Lan Wu, Frederick T. Sheldon, Mark Shere...
MODELS
2007
Springer
15 years 8 months ago
Useware Modeling for Ambient Intelligent Production Environments
The impact of user interface quality has grown in software systems engineering, and will grow further with upcoming new paradigms such as Ambient Intelligence or Ubiquitous Comput...
Daniel Görlich, Kai Breiner
IPPS
2006
IEEE
15 years 8 months ago
Base line performance measurements of access controls for libraries and modules
Having reliable security in systems is of the utmost importance. However, the existing framework of writing, distributing and linking against code in the form of libraries and/or ...
Jason W. Kim, Vassilis Prevelakis