Sciweavers

3516 search results - page 604 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
XMLSEC
2003
ACM
15 years 9 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
15 years 1 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
CODES
2009
IEEE
15 years 7 months ago
TotalProf: a fast and accurate retargetable source code profiler
Profilers play an important role in software/hardware design, optimization, and verification. Various approaches have been proposed to implement profilers. The most widespread app...
Lei Gao, Jia Huang, Jianjiang Ceng, Rainer Leupers...
RTCSA
2008
IEEE
15 years 10 months ago
Real-Time Communications Over Cluster-Tree Sensor Networks with Mobile Sink Behaviour
· Modelling the fundamental performance limits of Wireless Sensor Networks (WSNs) is of paramount importance to understand the behaviour of WSN under worst-case conditions and to...
Petr Jurcík, Ricardo Severino, Anis Koubaa,...
170
Voted
SIGGRAPH
2010
ACM
15 years 8 months ago
Unstructured video-based rendering: interactive exploration of casually captured videos
We present an algorithm designed for navigating around a performance that was filmed as a “casual” multi-view video collection: real-world footage captured on hand held camer...
Luca Ballan, Gabriel J. Brostow, Jens Puwein, Marc...