Sciweavers

20655 search results - page 75 / 4131
» Exploring Software Systems
Sort
View
NSPW
2006
ACM
15 years 8 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop
EURODAC
1995
IEEE
117views VHDL» more  EURODAC 1995»
15 years 6 months ago
Performance-complexity analysis in hardware-software codesign for real-time systems
The paper presents an approach for performance and complexity analysis of hardware/software implementations for real-time systems on every stage of the partitioning. There are two...
Victor V. Toporkov
COMPSAC
2001
IEEE
15 years 6 months ago
Certificate Based Authorization Simulation System
Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...
Jie Dai, Jim Alves-Foss
SCS
2003
15 years 3 months ago
A Contract-based Approach to Designing Safe Systems
Architectural based approaches to designing software are motivating changes in the way software is developed for safety-critical systems. These new approaches allow developers to d...
Iain Bate, Richard Hawkin, John A. McDermid
ACSW
2004
15 years 3 months ago
Towards a multi-lingual workflow system a practical outlook
Due to rapid development in the global market, workflow systems are not limited to a single country. Electronic business like workflows span across countries and hence there arise...
Bastin Tony Roy Savarimuthu, Maryam Purvis