Sciweavers

2169 search results - page 4 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 4 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
ER
2004
Springer
96views Database» more  ER 2004»
15 years 2 months ago
Risk-Driven Conceptual Modeling of Outsourcing Decisions
Abstract. In the current networked world, outsourcing of information technology or even of entire business processes is often a prominent design alternative. In the general case, o...
Pascal van Eck, Roel Wieringa, Jaap Gordijn
HASE
2008
IEEE
15 years 4 months ago
Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems
With the increasing complexity in software and electronics in safety-critical systems new challenges to lower the costs and decrease time-to-market, while preserving high assuranc...
Jonas Elmqvist, Simin Nadjm-Tehrani
AIEDAM
2000
98views more  AIEDAM 2000»
14 years 9 months ago
Generating and evaluating designs and plans for microwave modules
This paper describes the process planning techniques we developed for use in an Integrated Product and Process Design (IPPD) tool for the design and manufacture of microwave trans...
Dana S. Nau, Michael O. Ball, John S. Baras, Abdur...
OTM
2010
Springer
14 years 8 months ago
Using Real Option Thinking to Improve Decision Making in Security Investment
Making well-founded security investment decisions is hard: several alternatives may need to be considered, the alternatives’ space is often diffuse, and many decision parameters...
Virginia N. L. Franqueira, Siv Hilde Houmb, Maya D...