Sciweavers

2517 search results - page 103 / 504
» Secure Deployment of Components
Sort
View
CORR
2008
Springer
84views Education» more  CORR 2008»
15 years 3 months ago
Coupling Component Systems towards Systems of Systems
Systems of systems (SoS) are a hot topic in our "fully connected global world". Our aim is not to provide another definition of what SoS are, but rather to focus on the a...
Frédéric Autran, Jean-Philippe Auzel...
IM
2003
15 years 4 months ago
Multiple Authorization - A Model and Architecture for Increased, Practical Security
: Security of systems and management infrastructure is crucial for a successful, reliable and safe use. Most currently deployed systems are based on simple subject/object-relations...
Gerald Vogt
TELE
2008
85views more  TELE 2008»
15 years 3 months ago
Iris recognition and the challenge of homeland and border control security in UAE
This article discusses the implementation of iris recognition in improving the security of border control systems in the United Arab Emirates. The article explains the significanc...
Ahmad N. Al-Raisi, Ali M. Al-Khouri
AAAI
2012
13 years 5 months ago
Computing Game-Theoretic Solutions and Applications to Security
The multiagent systems community has adopted game theory as a framework for the design of systems of multiple self-interested agents. For this to be effective, efficient algorith...
Vincent Conitzer
99
Voted
ECBS
2000
IEEE
99views Hardware» more  ECBS 2000»
15 years 8 months ago
Enhancing Architectural Mismatch Detection with Assumptions
Detecting software architecture inconsistencies is a critical issue in software design. Software systems are described in terms of components, component behavior and interaction a...
Sebastián Uchitel, Daniel Yankelevich