Sciweavers

3516 search results - page 461 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ASPDAC
2005
ACM
130views Hardware» more  ASPDAC 2005»
15 years 6 months ago
Stability analysis of active clock deskewing systems using a control theoretic approach
— In this paper, a methodology for analyzing closed loop clock distribution and active deskewing networks is proposed. An active clock distribution and deskewing network is model...
Vinil Varghese, Tom Chen, Peter Young
EWSA
2005
Springer
15 years 10 months ago
On the Systematic Conformance Check of Software Artefacts
Abstract. In this paper we present a systematic check of the conformance of the implemented and the intended software architecture. Nowadays industry is confronted with rapidly evo...
Hylke W. van Dijk, Bas Graaf, Rob Boerman
ACMDIS
1997
ACM
15 years 8 months ago
HCI, Natural Science and Design: A Framework for Triangulation Across Disciplines
Human-computer interaction is multidisciplinary, drawing paradigms and techniques from both the natural sciences and the design disciplines. HCI cannot be considered a pure natura...
Wendy E. Mackay, Anne-Laure Fayard
SAFECOMP
2009
Springer
15 years 11 months ago
Probabilistic Failure Propagation and Transformation Analysis
A key concern in safety engineering is understanding the overall emergent failure behaviour of a system, i.e., behaviour exhibited by the system that is outside its specification ...
Xiaocheng Ge, Richard F. Paige, John A. McDermid
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
15 years 9 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...