Sciweavers

1209 search results - page 133 / 242
» Security as a new dimension in embedded system design
Sort
View
DAC
2009
ACM
15 years 4 months ago
ARMS - automatic residue-minimization based sampling for multi-point modeling techniques
This paper describes an automatic methodology for optimizing sample point selection for using in the framework of model order reduction (MOR). The procedure, based on the maximiza...
Jorge Fernandez Villena, Luis Miguel Silveira
IWIA
2005
IEEE
15 years 3 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
INTERACT
2003
14 years 11 months ago
Does an Individual's Myers-Briggs Type Indicator Preference Influence Task-Oriented Technology Use?
: Technology innovators face the challenge of finding representative groups of users to participate in design activities. In some cases, software applications will target an audien...
Pamela J. Ludford, Loren G. Terveen
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
15 years 3 months ago
Electronic Voting: Algorithmic and Implementation Issues
Electronic Transactions over the Internet, particularly using the World Wide Web have become an integral part of economic life. Recently also the public sector has started to use ...
Robert Kofler, Robert Krimmer, Alexander Prosser
DGO
2007
168views Education» more  DGO 2007»
14 years 11 months ago
A distributed event-triggered knowledge sharing system
Government agencies globally are facing problems such as illegal immigration, terrorism, and disease diagnosis and control. Solutions to these problems rely heavily on collaborati...
Seema Degwekar, Jeff DePree, Stanley Y. W. Su, How...