Sciweavers

3516 search results - page 260 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
164
Voted
SAC
2004
ACM
15 years 9 months ago
Towards a flexible, process-oriented IT architecture for an integrated healthcare network
Healthcare information systems play an important role in improving healthcare quality. As providing healthcare increasingly changes from isolated treatment episodes towards a cont...
Mario Beyer, Klaus Kuhn, Christian Meiler, Stefan ...
ISMVL
2003
IEEE
111views Hardware» more  ISMVL 2003»
15 years 9 months ago
Modeling Multi-Valued Circuits in SystemC
The complexity of todays hardware systems steadily increases. Due to this fact new ways of efficiently describing systems are investigated. A very promising approach in this area...
Daniel Große, Görschwin Fey, Rolf Drech...
CCS
2000
ACM
15 years 8 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
CSFW
2005
IEEE
15 years 9 months ago
End-to-End Availability Policies and Noninterference
This paper introduces the use of static information flow analysis for the specification and enforcement of end-toend availability policies in programs. We generalize the decentr...
Lantian Zheng, Andrew C. Myers
EMO
2009
Springer
143views Optimization» more  EMO 2009»
15 years 1 months ago
Adapting to the Habitat: On the Integration of Local Search into the Predator-Prey Model
Traditionally, Predator-Prey Models--although providing a more nature-oriented approach to multi-objective optimization than many other standard Evolutionary Multi-Objective Algori...
Christian Grimme, Joachim Lepping, Alexander Papas...