Sciweavers

434 search results - page 75 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
RE
2001
Springer
14 years 1 days ago
Deriving Safety Requirements Using Scenarios
Elicitation of requirements for safety critical aeroengine control systems is dependent on the capture of core design intent and the systematic derivation of requirements addressi...
Karen Allenby, Tim Kelly
NOCS
2007
IEEE
14 years 1 months ago
On the Design of a Photonic Network-on-Chip
Recent remarkable advances in nanoscale siliconphotonic integrated circuitry specifically compatible with CMOS fabrication have generated new opportunities for leveraging the uni...
Assaf Shacham, Keren Bergman, Luca P. Carloni
DRM
2003
Springer
14 years 25 days ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
AGENTS
2001
Springer
14 years 3 days ago
Adjustable autonomy in real-world multi-agent environments
Through adjustable autonomy (AA), an agent can dynamically vary the degree to which it acts autonomously, allowing it to exploit human abilities to improve its performance, but wi...
Paul Scerri, David V. Pynadath, Milind Tambe
IPCCC
2006
IEEE
14 years 1 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau