Sciweavers

3516 search results - page 322 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
15 years 8 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
MM
2006
ACM
125views Multimedia» more  MM 2006»
15 years 10 months ago
The design of a real-time, multimodal biofeedback system for stroke patient rehabilitation
This paper presents a novel real-time, multi-modal biofeedback system for stroke patient therapy. The problem is important as traditional mechanisms of rehabilitation are monotono...
Yinpeng Chen, He Huang, Weiwei Xu, Richard Isaac W...
ICESS
2005
Springer
15 years 9 months ago
Separate Compilation for Synchronous Modules
Abstract. Synchronous models are useful for designing real-time embedded systems because they provide timing control and deterministic concurrency. However, the semantics of such m...
Jia Zeng, Stephen A. Edwards
ICDE
2007
IEEE
111views Database» more  ICDE 2007»
15 years 10 months ago
Security Conscious Web Service Composition with Semantic Web Support
A Web service is a software system designed to support interoperable application-to-application interactions over the Internet. Recently, there has been a growing interest in Web ...
Barbara Carminati, Elena Ferrari, Ryan Bishop, Pat...
SIGCOMM
2010
ACM
15 years 4 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker