Sciweavers

3516 search results - page 540 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ECIS
2003
15 years 5 months ago
E-negotiations: towards engineering of technology-based social processes
Traditionally, negotiation support was based on normative and prescriptive research; its users were analysts and experts. The purpose of the recently developed e-negotiation syste...
Gregory E. Kersten
VLSID
2008
IEEE
191views VLSI» more  VLSID 2008»
15 years 10 months ago
Programming and Performance Modelling of Automotive ECU Networks
The last decade has seen a phenomenal increase in the use of electronic components in automotive systems, resulting in the replacement of purely mechanical or hydraulic-implementa...
Samarjit Chakraborty, Sethu Ramesh
CSFW
2011
IEEE
14 years 3 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
DOLAP
2005
ACM
15 years 6 months ago
Applying MDA to the development of data warehouses
Different modeling approaches have been proposed to overcome every design pitfall of the development of the different parts of a data warehouse (DW) system. However, they are all ...
Jose-Norberto Mazón, Juan Trujillo, Manuel ...
147
Voted
CIA
2008
Springer
15 years 6 months ago
Towards an Open Negotiation Architecture for Heterogeneous Agents
This paper presents the design of an open architecture for heterogeneous negotiating agents. Both the system level architecture as well as the architecture for negotiating agents a...
Koen V. Hindriks, Catholijn M. Jonker, Dmytro Tykh...