Sciweavers

1028 search results - page 97 / 206
» Using Attack Graphs to Design Systems
Sort
View
CORR
2006
Springer
116views Education» more  CORR 2006»
14 years 9 months ago
Memory Aware High-Level Synthesis for Embedded Systems
We introduce a new approach to take into account the memory architecture and the memory mapping in the High- Level Synthesis of Real-Time embedded systems. We formalize the memory...
Gwenolé Corre, Eric Senn, Nathalie Julien, ...
GECCO
2008
Springer
167views Optimization» more  GECCO 2008»
14 years 11 months ago
Using coevolution to understand and validate game balance in continuous games
We attack the problem of game balancing by using a coevolutionary algorithm to explore the space of possible game strategies and counter strategies. We define balanced games as g...
Ryan E. Leigh, Justin Schonfeld, Sushil J. Louis
INFOCOM
2005
IEEE
15 years 3 months ago
Joint congestion control and media access control design for ad hoc wireless networks
Abstract— We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix,...
Lijun Chen, Steven H. Low, John C. Doyle
ECBS
1999
IEEE
138views Hardware» more  ECBS 1999»
15 years 2 months ago
Multi-Domain Surety Modeling and Analysis for High Assurance Systems
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
James Davis, Jason Scott, Janos Sztipanovits, Marc...
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
15 years 1 months ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel