Sciweavers

739 search results - page 123 / 148
» A security framework for the analysis and design of software...
Sort
View
TIFS
2008
145views more  TIFS 2008»
13 years 7 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
ECBS
2009
IEEE
114views Hardware» more  ECBS 2009»
13 years 11 months ago
Model-Based Product-Oriented Certification
Future space missions such as the Mars Science Laboratory and Project Constellation suggest the engineering of some of the most complex man-rated software systems. The present pro...
Damian Dechev, Bjarne Stroustrup
MOBISYS
2008
ACM
14 years 7 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
SIPS
2006
IEEE
14 years 1 months ago
Configuration and Representation of Large-Scale Dataflow Graphs using the Dataflow Interchange Format
—A wide variety of DSP design tools have been developed that incorporate dataflow graph representations into their GUI-based design environments. However, as the complexity of ap...
Ivan Corretjer, Chia-Jui Hsu, Shuvra S. Bhattachar...
WCRE
2003
IEEE
14 years 24 days ago
Toward an environment for comprehending distributed systems
Many modern software systems are often large, distributed, written in more than one programming language, and developed using pre-built components. This paper presents the results...
Maher Salah, Spiros Mancoridis