Sciweavers

3771 search results - page 288 / 755
» Subobject Transformation Systems
Sort
View
ADAEUROPE
2005
Springer
15 years 10 months ago
Non-intrusive System Level Fault-Tolerance
This paper describes the methodology used to add nonintrusive system-level fault tolerance to an electronic throttle controller. The original model of the throttle controller is a...
Kristina Lundqvist, Jayakanth Srinivasan, Sé...
123
Voted
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
15 years 9 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
15 years 9 months ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
CAIP
2003
Springer
236views Image Analysis» more  CAIP 2003»
15 years 9 months ago
Efficient Algorithm of Eye Image Check for Robust Iris Recognition System
For the improvement of iris recognition system performance, the filtering algorithm that picks out counterfeit and noisy data is very important. In this paper, as a part of preproc...
Jain Jang, Kwiju Kim, Yillbyung Lee
DSN
2002
IEEE
15 years 9 months ago
Transactional Rollback for Language-Based Systems
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
Algis Rudys, Dan S. Wallach