Sciweavers

3516 search results - page 235 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
145
Voted
DAC
2004
ACM
16 years 4 months ago
Memory access scheduling and binding considering energy minimization in multi-bank memory systems
Memory-related activity is one of the major sources of energy consumption in embedded systems. Many types of memories used in embedded systems allow multiple operating modes (e.g....
Chun-Gi Lyuh, Taewhan Kim
114
Voted
MIR
2003
ACM
130views Multimedia» more  MIR 2003»
15 years 9 months ago
Multimedia modeling using MPEG-7 for authoring multimedia integration
In this paper, we describe an approach to audiovisual data modeling for multimedia integration and synchronization. The approach chosen consists in using description tools from Mu...
Tran-Thuong Tien, Cécile Roisin
142
Voted
CCS
2010
ACM
15 years 2 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
151
Voted
ICSOC
2004
Springer
15 years 9 months ago
Implementing integrated services of networked home appliances using service oriented architecture
This paper presents a method to implement integrated services of networked home electric appliances, which provide more convenient and comfortable living for home users. The conve...
Masahide Nakamura, Hiroshi Igaki, Haruaki Tamada, ...
118
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji