Sciweavers

2234 search results - page 384 / 447
» Protocol Implementation Using Integrated Layer Processing
Sort
View
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 8 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 7 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
IVA
2005
Springer
15 years 7 months ago
INTERFACE Toolkit: A New Tool for Building IVAs
INTERFACE is an integrated software implemented in Matlab© and created to speed-up the procedure for building an emotive/expressive talking head. Various processing tools, working...
Piero Cosi, Carlo Drioli, Fabio Tesser, Graziano T...
ICSOC
2004
Springer
15 years 6 months ago
Smart monitors for composed services
Service-based approaches are widely used to integrate heterogenous systems. Web services allow for the definition of highly dynamic systems where components (services) can be dis...
Luciano Baresi, Carlo Ghezzi, Sam Guinea
SEKE
1993
Springer
15 years 5 months ago
Recovering Conceptual Data Models is Human-Intensive
1 To handle the complexity of modern software systems, a software comprehension strategy pointing out the al abstraction level is necessary. In this context, the role of technology...
Fabio Abbattista, Filippo Lanubile, Giuseppe Visag...