Sciweavers

3516 search results - page 456 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
SAC
2006
ACM
15 years 10 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
SFM
2005
Springer
243views Formal Methods» more  SFM 2005»
15 years 10 months ago
Hermes: Agent-Based Middleware for Mobile Computing
Hermes is a middleware system for design and execution of activity-based applications in distributed environments. It supports mobile computation as an application implementation s...
Flavio Corradini, Emanuela Merelli
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
15 years 11 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
EOR
2006
178views more  EOR 2006»
15 years 4 months ago
A fuzzy optimization model for QFD planning process using analytic network approach
In both the quality improvement and the design of a product, the engineering characteristics affecting product performance are primarily identified and improved to optimize custom...
Cengiz Kahraman, Tijen Ertay, Gülçin B...
DEBS
2007
ACM
15 years 8 months ago
A taxonomy for denial of service attacks in content-based publish/subscribe systems
Denial of Service (DoS) attacks continue to affect the availability of critical systems on the Internet. The existing DoS problem is enough to merit significant research dedicated...
Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobs...