Sciweavers

3516 search results - page 466 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
DFT
2008
IEEE
138views VLSI» more  DFT 2008»
15 years 11 months ago
Exploring Density-Reliability Tradeoffs on Nanoscale Substrates: When do smaller less reliable devices make sense?
It is widely recognized that device and interconnect fabrics at the nanoscale will be characterized by an increased susceptibility to transient faults. This appears to be intrinsi...
Andrey V. Zykov, Gustavo de Veciana
STORAGESS
2005
ACM
15 years 10 months ago
The evolution of storage service providers: techniques and challenges to outsourcing storage
As enterprise storage needs grow, it is challenging to manage storage systems. The costs of locally managing, supporting, and maintaining resilience in storage systems has skyrock...
Ragib Hasan, William Yurcik, Suvda Myagmar
ER
2003
Springer
550views Database» more  ER 2003»
15 years 10 months ago
A UML Based Approach for Modeling ETL Processes in Data Warehouses
Data warehouses (DWs) are complex computer systems whose main goal is to facilitate the decision making process of knowledge workers. ETL (Extraction-Transformation-Loading) proces...
Juan Trujillo, Sergio Luján-Mora
UML
2005
Springer
15 years 10 months ago
Using Process Algebra to Validate Behavioral Aspects of Object-Oriented Models
We present in this paper a rigorous and automated based approach for the behavioral validation of control software systems. This approach relies on metamodeling, model-transformati...
Alban Rasse, Jean-Marc Perronne, Pierre-Alain Mull...
SACMAT
2005
ACM
15 years 10 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang