Sciweavers

3516 search results - page 328 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
DAC
1996
ACM
15 years 8 months ago
Experience in Designing a Large-scale Multiprocessor using Field-Programmable Devices and Advanced CAD Tools
This paper provides a case study that shows how a demanding application stresses the capabilities of today's CAD tools, especially in the integration of products from multipl...
Stephen Dean Brown, Naraig Manjikian, Zvonko G. Vr...
JWSR
2007
114views more  JWSR 2007»
15 years 4 months ago
Development of Distance Measures for Process Mining, Discovery and Integration
: Business processes continue to play an important role in today’s service-oriented enterprise computing systems. Mining, discovering, and integrating process-oriented services h...
Joonsoo Bae, Ling Liu, James Caverlee, Liang-Jie Z...
NSPW
2006
ACM
15 years 10 months ago
PKI design for the real world
What would a PKI look like if it were designed for implementability and deployability rather than strict adherence to a particular theoretical or mathematical model? This paper pr...
Peter Gutmann
AGENTS
1999
Springer
15 years 8 months ago
On Being a Teammate: Experiences Acquired in the design of RoboCup Teams
Increasingly, multi-agent systems are being designed for a variety of complex, dynamic domains. E ective agent interactions in such domains raise some of most fundamental research...
Stacy Marsella, Jafar Adibi, Yaser Al-Onaizan, Gal...
MOBIHOC
2008
ACM
16 years 3 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao