Sciweavers

3516 search results - page 347 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
IJCAI
2007
15 years 5 months ago
Augmented Experiment: Participatory Design with Multiagent Simulation
To test large scale socially embedded systems, this paper proposes a multiagent-based participatory design that consists of two steps; 1) participatory simulation, where scenario-...
Toru Ishida, Yuu Nakajima, Yohei Murakami, Hideyuk...
KER
2007
90views more  KER 2007»
15 years 4 months ago
Ontology-based models in pervasive computing systems
Pervasive computing is by its nature open and extensible, and must integrate the information from a diverse range of sources. This leads to a problem of information exchange, so s...
Juan Ye, Lorcan Coyle, Simon Dobson, Paddy Nixon
ICWN
2003
15 years 5 months ago
Modeling of WLAN Beacon Signal Strength Measured in an Indoor Environment
: In the fourth generation wireless networks, it is believed that wireless LANs (WLANs) will interwork with cellular systems to provide fast speed data services. The integration of...
Wenhui Zhang
FPL
2004
Springer
110views Hardware» more  FPL 2004»
15 years 9 months ago
Versatile Imaging Architecture Based on a System on Chip
Abstract. In this paper, a novel architecture dedicated to image processing is presented. The most original aspect of the approach is the use of a System On Chip implemented in a F...
Pierre Chalimbaud, François Berry
IDTRUST
2009
ACM
15 years 11 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...