Sciweavers

7366 search results - page 156 / 1474
» Development of the Information Systems Implementation Resear...
Sort
View
IRI
2006
IEEE
15 years 10 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
TJS
2002
118views more  TJS 2002»
15 years 4 months ago
The MAGNeT Toolkit: Design, Implementation and Evaluation
Abstract-The current trend in constructing high-performance computing systems is to connect a large number of machines via a fast interconnect or a large-scale network such as the ...
Wu-chun Feng, Mark K. Gardner, Jeffrey R. Hay
CISS
2011
IEEE
14 years 8 months ago
New hypothesis testing-based methods for fault detection for smart grid systems
Abstract—Fault detection plays an indispensable role in ensuring the security of smart grid systems. Based on the dynamics of the generators, we show the time evolution of the sm...
Qian He, Rick S. Blum
DIM
2007
ACM
15 years 8 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
AGTIVE
2007
Springer
15 years 8 months ago
Model-Driven Software Development with Graph Transformations: A Comparative Case Study
Abstract. Significant achievements have been made in the design and implementation of languages and tools for graph transformation systems. However, many other competing approaches...
Thomas Buchmann, Alexander Dotor, Sabrina Uhrig, B...