Sciweavers

2429 search results - page 233 / 486
» Using Aspects to Design a Secure System
Sort
View
ACIVS
2005
Springer
15 years 9 months ago
Designing Area and Performance Constrained SIMD/VLIW Image Processing Architectures
Abstract. Image processing is widely used in many applications, including medical imaging, industrial manufacturing and security systems. In these applications, the size of the ima...
Hamed Fatemi, Henk Corporaal, Twan Basten, Richard...
150
Voted
WWW
2011
ACM
14 years 10 months ago
Heat-seeking honeypots: design and experience
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...
123
Voted
CORR
2007
Springer
57views Education» more  CORR 2007»
15 years 3 months ago
Smartening the Environment using Wireless Sensor Networks in a Developing Country
 The miniaturization process of various sensing devices has become a reality by enormous research and advancements accomplished in Micro Electro-Mechanical Systems (MEMS) and Ve...
Al-Sakib Khan Pathan, Choong Seon Hong, Hyung-Woo ...
146
Voted
VOTEID
2007
Springer
15 years 9 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
DSVIS
2008
Springer
15 years 5 months ago
A Middleware for Seamless Use of Multiple Displays
Abstract. Current multi-display environments (MDEs) can be composed of displays with different characteristics (e.g. resolution, size) located in any position and at different angl...
Satoshi Sakurai, Yuichi Itoh, Yoshifumi Kitamura, ...