Sciweavers

3516 search results - page 169 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
119
Voted
ACSD
2005
IEEE
114views Hardware» more  ACSD 2005»
15 years 9 months ago
Controlling Speculative Design Processes Using Rich Component Models
This paper elaborates on the application of some aspects of robust systems control theory to the management of uncertainty and risk in distributed and complex design processes, ha...
Werner Damm
143
Voted
ISCAPDCS
2004
15 years 4 months ago
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management sys...
Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasg...
ECIS
2003
15 years 4 months ago
An architecture model for supporting application integration decisions
For a successful information systems architecture management, reference models and decision rules must be provided. In this paper, an architecture model and design rules are propo...
Robert Winter
ICCAD
2008
IEEE
246views Hardware» more  ICCAD 2008»
16 years 9 days ago
Integrated circuit design with NEM relays
—To overcome the energy-efficiency limitations imposed by finite sub-threshold slope in CMOS transistors, this paper explores the design of integrated circuits based on nanoelect...
Fred Chen, Hei Kam, Dejan Markovic, Tsu-Jae King L...
CSCW
2002
ACM
15 years 3 months ago
Activity Theory and System Design: A View from the Trenches
An activity theory model and a mediating artifacts hierarchy were employed to help identify the needs for tools for customer support engineers who documented solutions to customer...
Patricia Collins, Shilpa Shukla, David F. Redmiles