Sciweavers

3516 search results - page 357 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
RSP
2007
IEEE
141views Control Systems» more  RSP 2007»
15 years 10 months ago
Rapid Prototyping of Intrusion Detection Systems
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
Fabrice Kordon, Jean-Baptiste Voron
COORDINATION
2000
Springer
15 years 8 months ago
The LuCe Coordination Technology for MAS Design and Development on the Internet
Internet-based multi-agent systems call for new metaphors, abstractions, methodologies and enabling technologies specifically tailored to agent-oriented engineering. While coordin...
Enrico Denti, Andrea Omicini, Vladimiro Toschi
IJVR
2007
108views more  IJVR 2007»
15 years 4 months ago
Design and Narrative Structure for the Virtual Human Scenarios
—This article describes the design of the two application scenarios of the Virtual Human project and its integration into the Virtual Human system. This includes overall concepts...
Stefan Göbel, Ido Aharon Iurgel, Markus R&oum...
DAC
2003
ACM
16 years 5 months ago
An IDF-based trace transformation method for communication refinement
In the Artemis project [13], design space exploration of embedded systems is provided by modeling application behavior and architectural performance constraints separately. Mappin...
Andy D. Pimentel, Cagkan Erbas
PET
2004
Springer
15 years 9 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...