Sciweavers

3516 search results - page 288 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ECCV
1990
Springer
16 years 5 months ago
Measurement and Integration of 3-D Structures By Tracking Edge Lines
This paper describes techniques for dynamically modeling the 2-D appearance and 3-D geometry of a scene by integrating information from a moving camera. These techniques are illus...
James L. Crowley, Patrick Stelmaszyk
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 2 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
176
Voted
CODES
2007
IEEE
15 years 10 months ago
HySim: a fast simulation framework for embedded software development
Instruction Set Simulation (ISS) is widely used in system evaluation and software development for embedded processors. Despite the significant advancements in the ISS technology,...
Stefan Kraemer, Lei Gao, Jan Weinstock, Rainer Leu...
VIP
2001
15 years 5 months ago
Web-based Image Authentication Using Invisible Fragile Watermark
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret i...
Yusuk Lim, Changsheng Xu, David Dagan Feng
MEDES
2010
ACM
14 years 10 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...