Sciweavers

3516 search results - page 490 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
WOA
2000
15 years 5 months ago
Towards Interoperable Mechanized Reasoning Systems: the Logic Broker Architecture
There is a growing interest in the integration of mechanized reasoning systems such as automated theorem provers, computer algebra systems, and model checkers. State-of-the-art re...
Alessandro Armando, Daniele Zini
SIGCSE
2004
ACM
112views Education» more  SIGCSE 2004»
15 years 10 months ago
Great principles in computing curricula
The nearly three dozen core technologies of computing sit in a simple framework defined by great principles and by computing practices. The great principles are of two kinds, mech...
Peter J. Denning
LCN
2000
IEEE
15 years 8 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
IPTPS
2005
Springer
15 years 10 months ago
The Bittorrent P2P File-Sharing System: Measurements and Analysis
Of the many P2P file-sharing prototypes in existence, BitTorrent is one of the few that has managed to attract millions of users. BitTorrent relies on other (global) components f...
Johan A. Pouwelse, Pawel Garbacki, Dick H. J. Epem...
WETICE
1997
IEEE
15 years 8 months ago
MultiDisciplinary Design for Uninhabited Air Vehicles
Contemporary product design and process development is based on an iterative specify-evaluate-revise approach which is often time intensive and therein non-responsive to customer ...
Max Blair, Steven R. LeClair, Jeffrey V. Zweber, A...