Sciweavers

3516 search results - page 234 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
122
Voted
ECTEL
2009
Springer
15 years 8 months ago
Getting to Know Your User - Unobtrusive User Model Maintenance within Work-Integrated Learning Environments
Work-integrated learning (WIL) poses unique challenges for user model design: on the one hand users’ knowledge levels need to be determined based on their work activities – tes...
Stefanie N. Lindstaedt, Günter Beham, Barbara...
132
Voted
ODR
2008
15 years 5 months ago
Re-Consider: The Integration of Online Dispute Resolution and Decision Support Systems
Current approaches for the design of Online Dispute Resolution (ODR) systems involve the replication of Alternative Dispute Resolution practices such as mediation and negotiation. ...
Nial Muecke, Andrew Stranieri, Charlynn Miller
148
Voted
ACSAC
2009
IEEE
15 years 10 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
141
Voted
CODES
2007
IEEE
15 years 7 months ago
Synchronization after design refinements with sensitive delay elements
The synchronous computational model with its simple computation and communication mechanism makes it easy to describe, simulate and formally verify synchronous embedded systems at...
Tarvo Raudvere, Ingo Sander, Axel Jantsch
117
Voted
ASPDAC
2006
ACM
131views Hardware» more  ASPDAC 2006»
15 years 9 months ago
POSIX modeling in SystemC
- Early estimation of the execution time of Real-Time embedded SW is an essential task in complex, HW/SW embedded system design. Application SW execution time estimation requires t...
Hector Posadas, Jesús Ádamez, Pablo ...