Sciweavers

3516 search results - page 350 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ATAL
2011
Springer
14 years 4 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 10 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
147
Voted
SASN
2005
ACM
15 years 10 months ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava
VR
1999
IEEE
154views Virtual Reality» more  VR 1999»
15 years 8 months ago
A Virtual Assembly Design Environment
The Virtual Assembly Design Environment (VADE) is a Virtual Reality (VR) based engineering application which allows engineers to evaluate, analyze, and plan the assembly of mechan...
Sankar Jayaram, Yong Wang, Uma Jayaram, Kevin W. L...
JCDL
2004
ACM
130views Education» more  JCDL 2004»
15 years 9 months ago
ETANA-DL: a digital library for integrated handling of heterogeneous archaeological data
Archaeologists have to deal with vast quantities of information, generated both in the field and laboratory. That information is heterogeneous in nature, and different projects ha...
Unni Ravindranathan, Rao Shen, Marcos André...