Sciweavers

935 search results - page 97 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
JIPS
2007
223views more  JIPS 2007»
15 years 1 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
WCRE
2009
IEEE
15 years 8 months ago
Tracking Design Smells: Lessons from a Study of God Classes
—“God class” is a term used to describe a certain type of large classes which “know too much or do too much”. Often a God class (GC) is created by accident as functionali...
Stéphane Vaucher, Foutse Khomh, Naouel Moha...
CDC
2010
IEEE
118views Control Systems» more  CDC 2010»
14 years 8 months ago
Networked clock synchronization based on second order linear consensus algorithms
In this paper a distributed algorithm for clock synchronization is proposed. This algorithm is based on an extension of the consensus algorithm able to synchronize a family of dou...
Ruggero Carli, Sandro Zampieri
HIS
2009
14 years 11 months ago
Design Methodology of a Fault Aware Controller Using an Incipient Fault Diagonizer
The problem of failure diagnosis has received a considerable attention in the domain of reliability engineering, process control and computer science. The increasing stringent req...
Joydeb Roychoudhury, Tribeni Prasad Banerjee, Anup...
DAC
2008
ACM
16 years 2 months ago
Predictive runtime verification of multi-processor SoCs in SystemC
Concurrent interaction of multi-processor systems result in errors which are difficult to find. Traditional simulationbased verification techniques remove the concurrency informat...
Alper Sen, Vinit Ogale, Magdy S. Abadir