Sciweavers

6593 search results - page 1081 / 1319
» Integrated Learning Architectures
Sort
View
ACSAC
2001
IEEE
15 years 8 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
153
Voted
AINA
2003
IEEE
15 years 8 months ago
Formal Verification of Condition Data Flow Diagrams for Assurance of Correct Network Protocols
Condition Data Flow Diagrams (CDFDs) are a formalized notation resulting from the integration of Yourdon Data Flow Diagrams, Petri Nets, and pre-post notation. They are used in th...
Shaoying Liu
178
Voted
ATS
2001
IEEE
172views Hardware» more  ATS 2001»
15 years 8 months ago
A Built-in Self-Test and Self-Diagnosis Scheme for Heterogeneous SRAM Clusters
Testing and diagnosis are important issues in system-onchip (SOC) development, as more and more embedded cores are being integrated into the chips. In this paper we propose a buil...
Chih-Wea Wang, Ruey-Shing Tzeng, Chi-Feng Wu, Chih...
ECAI
2000
Springer
15 years 8 months ago
The WITAS Unmanned Aerial Vehicle Project
The purpose of this paper is to provide a broad overview of the WITAS Unmanned Aerial Vehicle Project. The WITAS UAV project is an ambitious, long-term basic research project with ...
Patrik Dohrty, Gösta H. Granlund, Krzysztof K...
FC
2000
Springer
127views Cryptology» more  FC 2000»
15 years 8 months ago
Blind, Auditable Membership Proofs
Auditability is an important property in nancial systems and architectures. Here we de ne the primitive of blind auditable membership proof" BAMP which combines public auditab...
Tomas Sander, Amnon Ta-Shma, Moti Yung
« Prev « First page 1081 / 1319 Last » Next »