Sciweavers

212 search results - page 20 / 43
» Risk Assessment and Integrity in System Design
Sort
View
HICSS
2005
IEEE
122views Biometrics» more  HICSS 2005»
15 years 6 months ago
Enterprise Architecture Integration in E-Government
Achieving goals of better integrated and responsive government services requires moving away from stand alone applications toward more comprehensive, integrated architectures. As ...
Marijn Janssen, Anthony M. Cresswell
CGA
2006
15 years 1 months ago
Secrets to Success and Fatal Flaws: The Design of Large-Display Groupware
Large displays are becoming increasingly common technologies in the workplace because of their potential as information displays and collaboration surfaces. Despite its growing ub...
Elaine M. Huang, Elizabeth D. Mynatt, Daniel M. Ru...
IAW
2003
IEEE
15 years 6 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
DATE
2005
IEEE
143views Hardware» more  DATE 2005»
15 years 6 months ago
Energy Bounds for Fault-Tolerant Nanoscale Designs
- The problem of determining lower bounds for the energy cost of a given nanoscale design is addressed via a complexity theory-based approach. This paper provides a theoretical fra...
Diana Marculescu
RTAS
2005
IEEE
15 years 6 months ago
Applying Sensitivity Analysis in Real-Time Distributed Systems
During real-world design of embedded real-time systems, it cannot be expected that all performance data required for scheduling analysis is fully available up front. In such situa...
Razvan Racu, Marek Jersak, Rolf Ernst