Sciweavers

3516 search results - page 177 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
OOPSLA
2007
Springer
15 years 9 months ago
A proposal for taming uncertainty in the collaborative conceptual model development process
There have been various proposals for the formalization of appropriate viewpoint-based frameworks. The model that we intend to devise attempts to provide a basis for conceptual mo...
Ebrahim Bagheri
144
Voted
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 4 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
120
Voted
ASAP
2004
IEEE
115views Hardware» more  ASAP 2004»
15 years 7 months ago
Design of the QBIC Wearable Computing Platform
Wearable computing systems can be broadly defined as mobile electronic devices that can be unobtrusively embedded in a user's outfit as part of the garment or an accessory. U...
Oliver Amft, Michael Lauffer, Stijn Ossevoort, Fab...
ISLPED
2003
ACM
95views Hardware» more  ISLPED 2003»
15 years 8 months ago
Power-aware scheduling of conditional task graphs in real-time multiprocessor systems
We propose a novel power-aware task scheduling algorithm for DVS-enabled real-time multiprocessor systems. Unlike the existing algorithms, the proposed DVS algorithm can handle co...
Dongkun Shin, Jihong Kim
DAC
2007
ACM
16 years 4 months ago
Towards An Ultra-Low-Power Architecture Using Single-Electron Tunneling Transistors
Minimizing power consumption is vitally important in embedded system design; power consumption determines battery lifespan. Ultralow-power designs may even permit embedded systems...
Changyun Zhu, Zhenyu (Peter) Gu, Li Shang, Robert ...