Sciweavers

3516 search results - page 386 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
CSREASAM
2003
15 years 6 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
ITBAM
2010
15 years 2 months ago
MEDCollector: Multisource Epidemic Data Collector
This paper analyzes the requirements and presents a novel approach to the development of a system for epidemiological data collection and integration based on the principles of int...
João Zamite, Fabrício A. B. Silva, F...
OOPSLA
2005
Springer
15 years 10 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
DATE
2005
IEEE
162views Hardware» more  DATE 2005»
15 years 10 months ago
A Model-Based Approach for Executable Specifications on Reconfigurable Hardware
UML 2.0 provides a rich set of diagrams for systems documentation and specification. Many efforts have been undertaken to employ different aspects of UML for multiple domains, mai...
Tim Schattkowsky, Wolfgang Müller 0003, Achim...
DASIP
2010
14 years 11 months ago
Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation
This paper proposes an automatic design flow from userfriendly design to efficient implementation of video processing systems. This design flow starts with the use of coarsegrain ...
Ruirui Gu, Jonathan Piat, Mickaël Raulet, J&o...