Sciweavers

3516 search results - page 365 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
HICSS
2007
IEEE
133views Biometrics» more  HICSS 2007»
15 years 11 months ago
Service-Oriented Software Reengineering: SoSR
Service-Oriented Computing (SOC) enables the development and design of loosely coupled software components for integration with other software system. Since most legacy system wer...
Sam Chung, Joseph Byung Chul An, Sergio Davalos
WETICE
2000
IEEE
15 years 8 months ago
Developing and Evaluating Collaborative Engineering Studios
We discuss a vision of and work in progress on a collaborative engineering environment, the Collaborative Design Studio, being developed at the Geometric and Intelligent Computing...
Jonathan Sevy, Vera Zaychik, Thomas T. Hewett, Wil...
HOST
2011
IEEE
14 years 4 months ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
FDL
2008
IEEE
15 years 11 months ago
Event-Triggered vs. Time-Triggered Communications with UML MARTE
In the real-time and embedded domain, systems tend to combine periodic and aperiodic computations. This leads to mixing event-triggered with timetriggered communications with thei...
Frédéric Mallet, Robert de Simone, L...
MSWIM
2006
ACM
15 years 10 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...