Sciweavers

1028 search results - page 87 / 103
» Using Attack Graphs to Design Systems
Sort
View
147 views 124 votes 15 years 6 months ago  SG 2005»
Parametric design systems model a design as a constrained collection of schemata. Designers work in such systems at two levels: definition of schemata and constraints; and search w...
193 views 117 votes 15 years 1 months ago  JOT 2007»
Workflow and business process modeling approaches have become essential for designing service collaborations when developing SOA-based systems. To derive actual executable busines...
175 views 128 votes 15 years 5 months ago  MA 2001»
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
75 views 91 votes 15 years 27 days ago  TISSEC 2002»
Language runtime systems are increasingly being embedded in systems to support runtime extensibility via mobile code. Such systems raise a number of concerns when the code running...
129 views 121 votes 15 years 3 months ago  CODES 2005»
System design based on static task graphs does not match well with modern consumer electronic devices with dynamic stream processing applications. We propose the TTL API for task ...
138 views 116 votes 15 years 6 months ago  DSD 2003»
Network on Chip (NoC) is a new paradigm for designing core based System on Chip which supports high degree of reusability and is scalable. In this paper we describe an efficient t...
95 views 100 votes 15 years 1 months ago  CACM 2006»
ional thinking is using abstraction and decomposition when attacking a large complex task or designing a large complex system. It is separation of concerns. It is choosing an appro...
165 views 149 votes 15 years 5 months ago  GD 1998»
We demonstrate the H3Viewer graph drawing library, which can be run from a standalone program or in conjunction with other programs such as SGI's Site Manager application. Our...
129 views 100 votes 15 years 7 months ago  ISCAS 2008»
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
98 views 104 votes 15 years 6 months ago  EUROPKI 2004»
Abstract. The Peer-to-Peer Wireless Network Confederation (P2PWNC) is designed to be an open self-organizing Wireless LAN (WLAN) roaming association where users from one WLAN can a...