Sciweavers

3516 search results - page 256 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
TACAS
1995
Springer
94views Algorithms» more  TACAS 1995»
15 years 7 months ago
A User Guide to HyTech
HyTech is a tool for the automated analysis of embedded systems. This document, designed for the rst-time user of HyTech, guides the reader through the underlying system model, an...
Thomas A. Henzinger, Pei-Hsin Ho, Howard Wong-Toi
ASE
2008
120views more  ASE 2008»
15 years 3 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
IPPS
2006
IEEE
15 years 9 months ago
FPGA implementation of a license plate recognition SoC using automatically generated streaming accelerators
Modern FPGA platforms provide the hardware and software infrastructure for building a bus-based System on Chip (SoC) that meet the applications requirements. The designer can cust...
Nikolaos Bellas, Sek M. Chai, Malcolm Dwyer, Dan L...
VRST
2005
ACM
15 years 9 months ago
An integrated system: virtual reality, haptics and modern sensing technique (VHS) for post-stroke rehabilitation
In this paper, we introduce an interdisciplinary project, involving researchers from the fields of Physical Therapy, Computer Science, Psychology, Communication and Cell Neurobiol...
Shih-Ching Yeh, Albert A. Rizzo, Weirong Zhu, Jill...
OSDI
2000
ACM
15 years 5 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro