Sciweavers

3516 search results - page 411 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ACMDIS
2006
ACM
15 years 10 months ago
Investigating design knowledge reuse for interface development
Reusing HCI design knowledge shows potential in allowing practitioners to design based on previously identified concerns. A reuse approach is presented that is based on claims, de...
Shahtab Wahid
FPT
2005
IEEE
163views Hardware» more  FPT 2005»
15 years 10 months ago
Designing an FPGA SoC Using a Standardized IP Block Interface
Designing Systems on-Chip is becoming increasingly popular as die sizes increase and technology sizes decrease. The complexity of integrating different types of Processing Element...
Lesley Shannon, Blair Fort, Samir Parikh, Arun Pat...
CCS
2008
ACM
15 years 6 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
SOUPS
2005
ACM
15 years 10 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
SE
2008
15 years 6 months ago
TIME - Tracking Intra- and Inter-Model Evolution
Abstract: Modern software development approaches, especially the model-driven approaches, heavily rely on the use of models during the whole development process. With the increasin...
Maximilian Kögel