Sciweavers

3516 search results - page 593 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
128
Voted
ICWE
2005
Springer
15 years 9 months ago
MDA Transformations Applied to Web Application Development
Current Web generation techniques are mainly hard-coded for predefined architectures of Web applications. Consequently, there is a gap between Web design models and the final imple...
Santiago Meliá, Andreas Kraus, Nora Koch
152
Voted
CCS
2009
ACM
15 years 10 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
138
Voted
USS
2008
15 years 6 months ago
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards
Optical scan electronic voting machines employ software components that are customized for each specific election. Such software components are critical from a security and integr...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
130
Voted
MICRO
2008
IEEE
138views Hardware» more  MICRO 2008»
15 years 10 months ago
Hybrid analytical modeling of pending cache hits, data prefetching, and MSHRs
As the number of transistors integrated on a chip continues to increase, a growing challenge is accurately modeling performance in the early stages of processor design. Analytical...
Xi E. Chen, Tor M. Aamodt
150
Voted
RTSS
2009
IEEE
15 years 10 months ago
Multiprocessor Extensions to Real-Time Calculus
Abstract—Many embedded platforms consist of a heterogeneous collection of processing elements, memory modules, and communication subsystems. These components often implement diff...
Hennadiy Leontyev, Samarjit Chakraborty, James H. ...