Sciweavers

3516 search results - page 497 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
15 years 11 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
EDOC
2007
IEEE
15 years 10 months ago
Providing Support for Model Composition in Metamodels
In aspect-oriented modeling (AOM), a design is described using a set of design views. It is sometimes necessary to compose the views to obtain an integrated view that can be analy...
Robert B. France, Franck Fleurey, Raghu Reddy, Ben...
DATE
2009
IEEE
215views Hardware» more  DATE 2009»
15 years 11 months ago
EMC-aware design on a microcontroller for automotive applications
In modern digital ICs, the increasing demand for performance and throughput requires operating frequencies of hundreds of megahertz, and in several cases exceeding the gigahertz r...
Patrice Joubert Doriol, Yamarita Villavicencio, Cr...
NSDI
2004
15 years 5 months ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...
TISSEC
2008
202views more  TISSEC 2008»
15 years 4 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning