Sciweavers

1028 search results - page 90 / 206
» Using Attack Graphs to Design Systems
Sort
View
ATAL
2003
Springer
15 years 3 months ago
Commitments and causality for multiagent design
This paper unifies two recent strands of research in multiagent system design. One, commitments are widely recognized as capturing important aspects of interactions among agents,...
Feng Wan, Munindar P. Singh
HIP
2005
Springer
173views Cryptology» more  HIP 2005»
15 years 3 months ago
Characters or Faces: A User Study on Ease of Use for HIPs
Web-based services designed for human users are being abused by computer programs (bots). This real-world issue has recently generated a new research area called Human Interactive...
Yong Rui, Zicheng Liu, Shannon Kallin, Gavin Janke...
MSWIM
2005
ACM
15 years 3 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
IWSSD
2000
IEEE
15 years 2 months ago
Specification, Safety and Reliability Analysis Using Stochastic Petri Net Models
In this study we focus on the specification and assessment of Stochastic Petri net (SPN) models to evaluate the design of an embedded system for reliability and availability. The ...
Frederick T. Sheldon, Stefan Greiner, Matthias Ben...
AHS
2007
IEEE
211views Hardware» more  AHS 2007»
15 years 1 months ago
Synthesis of Multimode digital signal processing systems
In this paper, we propose a design methodology for implementing a multimode (or multi-configuration) and multi-throughput system into a single hardware architecture. The inputs of...
Caaliph Andriamisaina, Emmanuel Casseau, Philippe ...