Sciweavers

141 search results - page 16 / 29
» Application of Vulnerability Discovery Models to Major Opera...
Sort
View
CASES
2005
ACM
13 years 9 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
DIMACS
1996
13 years 9 months ago
Model Checking and the Mu-calculus
There is a growing recognition of the need to apply formal mathematical methods in the design of \high con dence" computing systems. Such systems operate in safety critical co...
E. Allen Emerson
EURODAC
1994
IEEE
211views VHDL» more  EURODAC 1994»
13 years 11 months ago
Advanced simulation and modeling techniques for hardware quality verification of digital systems
synchronisation also play a fundamental role in overall system robustness. ElectroMagnetic Compatibility (EMC) and ElectroMagnetic Interference (EMI) issues also have to be conside...
S. Forno, Stephen Rochel
AGS
2009
Springer
14 years 2 months ago
Intelligent Agent Modeling as Serious Game
We propose a novel approach to intelligent tutoring gaming simulations designed for both educational and inquiry purposes in complex multi-actor systems such as infrastructures or...
D. W. F. van Krevelen
IJCIS
1998
78views more  IJCIS 1998»
13 years 7 months ago
Merging Databases Under Constraints
The problem of integrating information from con icting sources comes up in many current applications, such as cooperative information systems, heterogeneous databases, and multi-a...
Jinxin Lin, Alberto O. Mendelzon