Sciweavers

3104 search results - page 105 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
117
Voted
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
NCA
2007
IEEE
15 years 10 months ago
Implementing Atomic Data through Indirect Learning in Dynamic Networks
Developing middleware services for dynamic distributed systems, e.g., ad-hoc networks, is a challenging task given that such services deal with dynamically changing membership and...
Kishori M. Konwar, Peter M. Musial, Nicolas C. Nic...
IMR
2005
Springer
15 years 9 months ago
Design and Implementation of a Corporate Mesh Object
Today, finite element technologies allow engineers to analyze complex assemblies and subsystems. With CPU power constantly increasing, it is not unreasonable to state that the eng...
John Svitek, Wa Kwok, Joseph R. Tristano
124
Voted
ICRA
2005
IEEE
140views Robotics» more  ICRA 2005»
15 years 9 months ago
Field Testing of the Mars Exploration Rovers Descent Image Motion Estimation System
– The Mars Exploration Rover (MER) Descent Image Motion Estimation System (DIMES) is the first autonomous machine vision system used to safely land a robotics payload on another ...
Andrew Edie Johnson, Reg G. Willson, Jay Goguen, J...
CADE
2010
Springer
15 years 4 months ago
Automating Security Analysis: Symbolic Equivalence of Constraint Systems
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity ...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...