Sciweavers

2864 search results - page 326 / 573
» Geo Linked Data
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
ACSC
2005
IEEE
15 years 10 months ago
Simulating Network Robustness for Critical Infrastructure Networks
We examine the robustness of critical infrastructure networks in the face of terrorist attack, using a simulation experiment that incorporates link capacity; and an extension of d...
Anthony H. Dekker
ICAC
2005
IEEE
15 years 10 months ago
Autonomicity of NASA Missions
NASA increasingly relies on autonomous systems concepts, not only in the mission control centers on the ground, but also on spacecraft, on rovers and other assets on extraterrestr...
Christopher Rouff, Michael G. Hinchey, James L. Ra...
148
Voted
ISCAS
2005
IEEE
144views Hardware» more  ISCAS 2005»
15 years 10 months ago
Event-based imaging with active illumination in sensor networks
— We discuss a distributed imaging architecture with active illumination for sensor network applications. An event-based CMOS imager is employed at the sensor level, to convert l...
Eugenio Culurciello, Thiago Teixeira, Andreas G. A...
RSP
2005
IEEE
107views Control Systems» more  RSP 2005»
15 years 10 months ago
Rapid Prototyping of Embedded Software Using Selective Formalism
Our software synthesis tool, CSP++, generates C++ source code from verifiable CSPm specifications, and includes a framework for runtime execution. Our technique of selective for...
John D. Carter, Ming Xu, William B. Gardner