Sciweavers

4330 search results - page 51 / 866
» Analyzing security architectures
Sort
View
VLSID
2003
IEEE
104views VLSI» more  VLSID 2003»
14 years 9 months ago
Analyzing Soft Errors in Leakage Optimized SRAM Design
Reducing leakage power and improving the reliability of data stored in the memory cells are both becoming challenging as technology scales down. While the smaller threshold voltag...
Vijay Degalahal, Narayanan Vijaykrishnan, Mary Jan...
ICIAP
2005
ACM
14 years 8 months ago
Analyzing TCP Traffic Patterns Using Self Organizing Maps
The continuous evolution of the attacks against computer networks has given renewed strength to research on anomaly based Intrusion Detection Systems, capable of automatically dete...
Stefano Zanero
ECBS
2005
IEEE
58views Hardware» more  ECBS 2005»
14 years 2 months ago
MoDeII: Modeling and Analyzing Time-Constraints
The fulfillment of time requirements is one of the major acceptance criteria of safety-critical and real-time systems. They are dictated by the environment of these systems and a...
Jewgenij Botaschanjan, Jan Jürjens
CRIWG
2006
13 years 10 months ago
Analyzing the Roles of PDA in Meeting Scenarios
This paper proposes a conceptual model standardizing the meeting information structures underlying several scenarios o PDA use in meetings. The paper characterizes the memory and p...
Gustavo Zurita, Pedro Antunes, Luís Carri&c...
FOSSACS
2006
Springer
14 years 5 days ago
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
Abstract. Web services are an important series of industry standards for adding semantics to web-based and XML-based communication, in particular among enterprises. Like the entire...
Michael Backes, Sebastian Mödersheim, Birgit ...