Sciweavers

3516 search results - page 486 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
COMPSAC
2009
IEEE
15 years 8 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye
AGENTS
2000
Springer
15 years 9 months ago
Dataflow plan execution for software agents
Recent research has made it possible to build information agents that retrieve and integrate information from the World Wide Web. Although there now exist solutions for modeling W...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...
SMA
2003
ACM
100views Solid Modeling» more  SMA 2003»
15 years 9 months ago
Free-form deformations via sketching and manipulating scalar fields
This paper presents a novel Scalar-field based Free-Form Deformation (SFFD) technique founded upon general flow constraints and implicit functions. In contrast to the traditiona...
Jing Hua, Hong Qin
127
Voted
USS
2004
15 years 5 months ago
A Virtual Honeypot Framework
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
Niels Provos
JSA
2008
94views more  JSA 2008»
15 years 4 months ago
Energy reduction through crosstalk avoidance coding in networks on chip
Commercial designs are currently integrating from 10 to 100 embedded processors in a single system on chip (SoC) and the number is likely to increase significantly in the near fut...
Partha Pratim Pande, Amlan Ganguly, Haibo Zhu, Cri...