Sciweavers

597 search results - page 67 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
ERLANG
2003
ACM
14 years 27 days ago
ARMISTICE: an experience developing management software with Erlang
In this paper, some experiences of using the concurrent functional language Erlang to implement a classical vertical application, a risk management information system, are present...
David Cabrero, Carlos Abalde, Carlos Varela, Laura...
AIPR
2004
IEEE
13 years 11 months ago
Embedded Reading Device for Blind People: A User-Centred Design
A handheld PDA-based system is being developed to help blind people in their daily tasks. The design combines in a continuous process Users' involvement and Engineers' e...
Jean-Pierre Peters, Céline Thillou, Silvio ...
COMPSAC
2009
IEEE
13 years 11 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye
HT
2005
ACM
14 years 1 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver
ANCS
2006
ACM
14 years 1 months ago
Advanced algorithms for fast and scalable deep packet inspection
Modern deep packet inspection systems use regular expressions to define various patterns of interest in network data streams. Deterministic Finite Automata (DFA) are commonly used...
Sailesh Kumar, Jonathan S. Turner, John Williams