Sciweavers

3516 search results - page 154 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
15 years 7 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
ISORC
2006
IEEE
15 years 9 months ago
Interaction-Based Behavior Modeling of Embedded Software using UML 2.0
Many prior approaches in UML-based embedded software design incorporate state-based behavior modeling. However, interaction-based behavior modeling provides more intuitive view of...
Sang-Uk Jeon, Jang-Eui Hong, Doo-Hwan Bae
DATE
2005
IEEE
113views Hardware» more  DATE 2005»
15 years 9 months ago
Hardware-Software Design of a Smart Sensor for Fully-Electronic DNA Hybridization Detection
This paper describes the design of a smart sensor for label-free detection of DNA hybridization. The sensor is based on a direct electrical transduction principle: it measures imp...
Claudio Stagni, Carlotta Guiducci, Massimo Lanzoni...
ISSS
2002
IEEE
126views Hardware» more  ISSS 2002»
15 years 8 months ago
Unifying Memory and Processor Wrapper Architecture in Multiprocessor SoC Design
In this paper, we present a new methodology for application specific multiprocessor system-on-chip design. This approach facilitates the integration of existing components with th...
Ahmed Amine Jerraya, Damien Lyonnard, Samy Meftali...
ACSAC
2004
IEEE
15 years 7 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe