Sciweavers

12670 search results - page 221 / 2534
» Requirements Modeling
Sort
View
CRYPTO
2012
Springer
219views Cryptology» more  CRYPTO 2012»
13 years 7 months ago
Tamper and Leakage Resilience in the Split-State Model
It is notoriously difficult to create hardware that is immune from side channel and tampering attacks. A lot of recent literature, therefore, has instead considered algorithmic de...
Feng-Hao Liu, Anna Lysyanskaya
177
Voted
RTSS
2006
IEEE
15 years 11 months ago
Modeling and Worst-Case Dimensioning of Cluster-Tree Wireless Sensor Networks
Time-sensitive Wireless Sensor Network (WSN) applications require finite delay bounds in critical situations. This paper provides a methodology for the modeling and the worst-case...
Anis Koubaa, Mário Alves, Eduardo Tovar
JCS
1998
117views more  JCS 1998»
15 years 4 months ago
A Semantic-Based Transaction Processing Model for Multilevel Transactions
Multilevel transactions have been proposed for multilevel secure databases; in contrast to most proposals, such transactions allow users to read and write across multiple security...
Indrakshi Ray, Paul Ammann, Sushil Jajodia
ICASSP
2010
IEEE
15 years 5 months ago
Simulating dynamic communication systems using the core functional dataflow model
The latest communication technologies invariably consist of modules with dynamic behavior. There exists a number of design tools for communication system design with their foundat...
Nimish Sane, Chia-Jui Hsu, José Luis Pino, ...
195
Voted
ICCBSS
2005
Springer
15 years 10 months ago
Using Goals and Quality Models to Support the Matching Analysis During COTS Selection
The selection process is a crucial activity of the development of COTS-based systems. A key step of the evaluation of COTS components carried out during selection is the matching b...
Carina Alves, Xavier Franch, Juan Pablo Carvallo, ...