Sciweavers

427 search results - page 30 / 86
» Applying Aspect-Orientation in Designing Security Systems: A...
Sort
View
ICIAR
2010
Springer
14 years 1 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
COMPLEX
2009
Springer
14 years 3 months ago
Designing Capital-Intensive Systems with Architectural and Operational Flexibility Using a Screening Model
: Development of capital intensive systems, such as offshore oil platforms or other industrial infrastructure, generally requires a significant amount of capital investment under v...
Jijun Lin, Olivier de Weck, Richard de Neufville, ...
CODES
2006
IEEE
14 years 2 months ago
TLM/network design space exploration for networked embedded systems
This paper presents a methodology to combine Transaction Level Modeling and System/Network co-simulation for the design of networked embedded systems. As a result, a new design di...
Nicola Bombieri, Franco Fummi, Davide Quaglia
ICSM
2006
IEEE
14 years 2 months ago
Guiding the Application of Design Patterns Based on UML Models
Software design patterns are documented best practice solutions that can be applied to reoccurring problems. Although well documented, there are often opportunities to apply them ...
Lionel C. Briand, Yvan Labiche, Alexandre Sauve
CODES
2009
IEEE
14 years 3 months ago
Exploiting data-redundancy in reliability-aware networked embedded system design
This paper presents a system-level design methodology for networked embedded systems that exploits existing data-redundancy to increase their reliability. The presented approach n...
Martin Lukasiewycz, Michael Glaß, Jürge...