Sciweavers

224 search results - page 31 / 45
» An Information Flow Verifier for Small Embedded Systems
Sort
View
CSREASAM
2009
13 years 8 months ago
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process
Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, i...
Michael R. Grimaila, Larry Fortson, Janet Sutton
MMS
2008
13 years 7 months ago
Canonical processes of semantically annotated media production
While many multimedia systems allow the association of semantic annotations with media assets, there is no agreedupon way of sharing these among systems. As an initial step within...
Lynda Hardman, Zeljko Obrenovic, Frank Nack, Brigi...
KES
2008
Springer
13 years 7 months ago
Aware Group Home Enhanced by RFID Technology
Abstract. In Japan, a Group Home which offers home-based care service for elderly persons who suffer from dementia have been increased. Even though the small community of the home ...
Motoki Miura, Sadanori Ito, Ryozo Takatsuka, Susum...
SACMAT
2006
ACM
14 years 1 months ago
PRIMA: policy-reduced integrity measurement architecture
We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availabi...
Trent Jaeger, Reiner Sailer, Umesh Shankar
WORDS
2003
IEEE
14 years 24 days ago
Timing Analysis of Optimised Code
Timing analysis is a crucial test for dependable hard real-time systems (DHRTS). The calculation of the worst-case execution time (WCET) is mandatory. As modern compilers are capa...
Raimund Kirner, Peter P. Puschner