Sciweavers

3516 search results - page 232 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
152
Voted
IDTRUST
2010
ACM
15 years 2 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
140
Voted
WSC
1997
15 years 5 months ago
Simulation of Modern Parallel Systems: A CSIM-based Approach
Components of modern parallel systems are becoming quite complex with many features and variations. An integrated modeling of these components (interconnection network, messaging ...
Dhabaleswar K. Panda, Debashis Basak, Donglai Dai,...
139
Voted
ECCE
2007
15 years 5 months ago
Design of argument diagramming for case-based group learning
Argument diagramming tools can improve reasoning and learning. They are likely to have a significant place in future virtual learning environments whose design will be dominated b...
John Dowell, Thomas Gladisch
118
Voted
ISVLSI
2005
IEEE
101views VLSI» more  ISVLSI 2005»
15 years 9 months ago
eWatch: Context Sensitive System Design Case Study
In this paper, we introduce a novel context sensitive system design paradigm. Multiple sensors/ computational architecture, in the form of our eWatch device, is used to infer the ...
Asim Smailagic, Daniel P. Siewiorek, Uwe Maurer, A...
142
Voted
FC
2006
Springer
99views Cryptology» more  FC 2006»
15 years 7 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot