Sciweavers

2663 search results - page 50 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
KBSE
2007
IEEE
15 years 4 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
SIGCSE
2006
ACM
188views Education» more  SIGCSE 2006»
15 years 3 months ago
A data mining course for computer science: primary sources and implementations
An undergraduate elective course in data mining provides a strong opportunity for students to learn research skills, practice data structures, and enhance their understanding of a...
David R. Musicant
MOBISYS
2004
ACM
15 years 9 months ago
Implementing Software on Resource-Constrained Mobile Sensors: Experiences with Impala and ZebraNet
ZebraNet is a mobile, wireless sensor network in which nodes move throughout an environment working to gather and process information about their surroundings [10]. As in many sen...
Ting Liu, Christopher M. Sadler, Pei Zhang, Margar...
PADL
2010
Springer
14 years 11 months ago
A Simple and Efficient Implementation of Concurrent Local Tabling
Newer Prolog implementations commonly offer support for multi-threading, and have also begun to offer support for tabling. However, most implementations do not yet integrate tablin...
Rui Marques, Terrance Swift, José C. Cunha
ICCAD
1998
IEEE
71views Hardware» more  ICCAD 1998»
15 years 2 months ago
High-level variable selection for partial-scan implementation
In this paper, we propose a high-level variable selection for partial-scan approach to improve the testability of digital systems. The testability of a design is evaluated at the ...
Frank F. Hsu, Janak H. Patel