Sciweavers

991 search results - page 46 / 199
» Foundations for Designing Secure Architectures
Sort
View
COMPUTER
2007
153views more  COMPUTER 2007»
14 years 10 months ago
The Discipline of Embedded Systems Design
ems, using abstractions that actually remove physical constraints from consideration. At the other, embedded systems design goes beyond the traditional expertise of electrical engi...
Thomas A. Henzinger, Joseph Sifakis
ACIVS
2005
Springer
15 years 3 months ago
Designing Area and Performance Constrained SIMD/VLIW Image Processing Architectures
Abstract. Image processing is widely used in many applications, including medical imaging, industrial manufacturing and security systems. In these applications, the size of the ima...
Hamed Fatemi, Henk Corporaal, Twan Basten, Richard...
HUC
2009
Springer
15 years 2 months ago
A spotlight on security and privacy risks with future household robots: attacks and lessons
Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household r...
Tamara Denning, Cynthia Matuszek, Karl Koscher, Jo...
DEXAW
1998
IEEE
82views Database» more  DEXAW 1998»
15 years 2 months ago
User Authentication in Multidatabase Systems
The aspect of security needs more consideration in the area of architectures for multidatabase systems. Particularly, the authentication of users which is a main prerequisite for ...
Eyk Hildebrandt, Gunter Saake
MM
2005
ACM
133views Multimedia» more  MM 2005»
15 years 3 months ago
Designing time-based interactions with multimedia
The current model of time in multimedia frameworks poses particular problems when designing multimedia systems with timebased interaction. We propose to expand and extend an exist...
Eric Lee