Sciweavers

5475 search results - page 147 / 1095
» Model Driven Security
Sort
View
79
Voted
STORAGESS
2006
ACM
15 years 6 months ago
Access control for a replica management database
Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the loc...
Justin M. Wozniak, Paul Brenner, Douglas Thain
102
Voted
SEKE
2007
Springer
15 years 7 months ago
A Model-driven Approach to Architecting Secure Software
A software architecture provides a high-level description of a software solution in terms of the structure, topology, and interactions between its principal components. While a nu...
Ebenezer A. Oladimeji, Sam Supakkul, Lawrence Chun...
DATE
1999
IEEE
112views Hardware» more  DATE 1999»
15 years 5 months ago
Efficient Switching Activity Simulation under a Real Delay Model Using a Bitparallel Approach
Estimating switching activity is a crucial step in optimizing circuits for low power. In this paper, a fast gate level switching activity estimator for combinational circuits will...
Markus Bühler, Matthias Papesch, K. Kapp, Utz...
GI
2009
Springer
14 years 10 months ago
Autonomous Units to Model Games
: Communities of autonomous units are devices to model the interaction of independent processes in a rule-based and graphical way. In this paper, the framework is proposed to descr...
Hans-Jörg Kreowski, Sabine Kuske, Hauke T&oum...
ICSNC
2006
IEEE
15 years 6 months ago
Security Issues in Wireless Sensor Networks
– Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive documen...
Tanveer Zia, Albert Y. Zomaya