Sciweavers

3516 search results - page 659 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
CONEXT
2009
ACM
14 years 9 months ago
Lockr: better privacy for social networks
Today's online social networking (OSN) sites do little to protect the privacy of their users' social networking information. Given the highly sensitive nature of the inf...
Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, ...
MOBICOM
2004
ACM
15 years 5 months ago
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
CORR
2007
Springer
170views Education» more  CORR 2007»
14 years 11 months ago
Animation of virtual mannequins, robot-like simulation or motion captures
— In order to optimize the costs and time of design of the new products while improving their quality, concurrent engineering is based on the digital model of these products, the...
Damien Chablat
VIS
2009
IEEE
215views Visualization» more  VIS 2009»
16 years 1 months ago
BrainGazer - Visual Queries for Neurobiology Research
Abstract-- Neurobiology investigates how anatomical and physiological relationships in the nervous system mediate behavior. Molecular genetic techniques, applied to species such as...
Stefan Bruckner, Veronika Šoltészová, M. Edua...
CP
2007
Springer
15 years 6 months ago
Scheduling Conditional Task Graphs
The increasing levels of system integration in Multi-Processor System-on-Chips (MPSoCs) emphasize the need for new design flows for efficient mapping of multi-task applications o...
Michele Lombardi, Michela Milano