Sciweavers

2169 search results - page 23 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
VLSID
2001
IEEE
200views VLSI» more  VLSID 2001»
16 years 2 months ago
Evaluation of the Traffic-Performance Characteristics of System-on-Chip Communication Architectures
The emergence of several communication architectures for System-on-Chips provides designers with a variety of design alternatives. In addition, the need to customize the system ar...
Kanishka Lahiri, Sujit Dey, Anand Raghunathan
109
Voted
FC
2009
Springer
104views Cryptology» more  FC 2009»
15 years 8 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
IWIA
2005
IEEE
15 years 7 months ago
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
Stephen Boyer, Oliver Dain, Robert Cunningham
90
Voted
AVI
2004
15 years 3 months ago
Usability studies on a visualisation for parallel display and control of alternative scenarios
Many applications require comparison between alternative scenarios; most support it poorly. A subjunctive interface supports comparison through its facilities for parallel setup, ...
Aran Lunzer, Kasper Hornbæk
JNW
2007
118views more  JNW 2007»
15 years 1 months ago
Alternate Routing in Tandem Traffic-Groomed Optical Networks
— Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to the ever-increasing demands of the Internet. Because these networks carry large...
Alicia Nicki Washington, Harry G. Perros