Sciweavers

3516 search results - page 442 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
123
Voted
SIGMETRICS
2008
ACM
15 years 4 months ago
A Diophantine model of routes in structured P2P overlays
Abstract-- An important intrinsic property of any structured Peer-to-Peer (P2P) overlay is multi-hop paths. Understanding their structure helps to solve challenging problems relate...
Dmitry Korzun, Andrei Gurtov
WSC
2008
15 years 7 months ago
A simulation template for modeling tunnel shaft construction
This paper presents the design and development of a template for analyzing shaft construction projects. It is suitable for integration with the existing Tunneling template of the ...
Fangyi Zhou, Simaan M. AbouRizk, Siri Fernando
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
15 years 10 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
DATE
2002
IEEE
95views Hardware» more  DATE 2002»
15 years 9 months ago
Window-Based Susceptance Models for Large-Scale RLC Circuit Analyses
Due to the increasing operating frequencies and the manner in which the corresponding integrated circuits and systems must be designed, the extraction, modeling and simulation of ...
Hui Zheng, Lawrence T. Pileggi, Michael W. Beattie...
ISSS
2002
IEEE
148views Hardware» more  ISSS 2002»
15 years 9 months ago
A Case Study of Hardware and Software Synthesis in ForSyDe
ForSyDe (FORmal SYstem DEsign) is a methodology which addresses the design of SoC applications which may contain control as well as data flow dominated parts. Starting with a for...
Ingo Sander, Axel Jantsch, Zhonghai Lu