Sciweavers

154 search results - page 15 / 31
» Security architecture testing using IDS - a case study
Sort
View
JSS
2007
169views more  JSS 2007»
14 years 9 months ago
MDABench: Customized benchmark generation using MDA
This paper describes an approach for generating customized benchmark suites from a software architecture description following a Model Driven Architecture (MDA) approach. The benc...
Liming Zhu, Ngoc Bao Bui, Yan Liu, Ian Gorton
DAC
2003
ACM
15 years 10 months ago
Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system
This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...
ICESS
2007
Springer
15 years 3 months ago
Situation-Aware Based Self-adaptive Architecture for Mission Critical Systems
Conventional mission-critical systems cannot prevent mission failure in dynamic battlefield environments in which the execution situations or missions change abruptly. To solve th...
Sangsoo Kim, Jiyong Park, Heeseo Chae, Hoh Peter I...
SIGSOFT
2007
ACM
15 years 10 months ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...
HIPC
2004
Springer
15 years 3 months ago
iSAN - An Intelligent Storage Area Network Architecture
This paper describes the motivation, architecture and implementation of iSAN, an “intelligent” storage area network. The main contributions of this work are: (1) how to archite...
Ganesh M. Narayan, K. Gopinath