Sciweavers

3641 search results - page 123 / 729
» A System Design Methodology for Telecommunication Network Ap...
Sort
View
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
15 years 11 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
HOLOMAS
2007
Springer
15 years 10 months ago
A Holonic Metamodel for Agent-Oriented Analysis and Design
Abstract. Holonic multiagent systems (hmas) offers a promising software engineering approach for developing applications in complex domains characterized by a hierarchical structu...
Massimo Cossentino, Nicolas Gaud, Stéphane ...
134
Voted
ISORC
1998
IEEE
15 years 8 months ago
The Time-Triggered Architecture
The Time-Triggered Architecture (TTA) provides a computing infrastructure for the design and implementation of dependable distributed embedded systems. A large real-time applicatio...
Hermann Kopetz
121
Voted
WSC
2004
15 years 6 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
ENTCS
2007
92views more  ENTCS 2007»
15 years 4 months ago
The MoR-Trust Distributed Trust Management System: Design and Simulation Results
MoR-Trust is a purely decentralized peer-to-peer trust management system, targeted towards networks and applications supporting transactions or collaborations of a quantitative na...
Stephanos Androutsellis-Theotokis, Diomidis Spinel...