Sciweavers

23406 search results - page 64 / 4682
» Architecture, Design, Implementation
Sort
View
KBSE
2007
IEEE
14 years 4 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
SIGCSE
2010
ACM
231views Education» more  SIGCSE 2010»
14 years 3 months ago
Implementing studio-based learning in CS2
This paper presents an experience in designing, implementing, and evaluating a studio-based learning model for CS2. Adapted from architecture and art education, as well as from co...
T. Dean Hendrix, Lakshman Myneni, N. Hari Narayana...
CCECE
2006
IEEE
14 years 4 months ago
Survey of Biological High Performance Computing: Algorithms, Implementations and Outlook Research
During recent years there has been an explosive growth of biological data coming from genome projects, proteomics, protein structure determination, and the rapid expansion in digi...
Nasreddine Hireche, J. M. Pierre Langlois, Gabriel...
SC
2009
ACM
14 years 4 months ago
Allocator implementations for network-on-chip routers
The present contribution explores the design space for virtual channel (VC) and switch allocators in network-on-chip (NoC) routers. Based on detailed RTL-level implementations, we...
Daniel U. Becker, William J. Dally
IEEESCC
2005
IEEE
14 years 3 months ago
SOA Without Web Services: a Pragmatic Implementation of SOA for Financial Transactions Systems
The Service Oriented Architecture (SOA) provides a methodology for designing software systems by integrating loosely coupled services. Compared to traditional distributed object-o...
Ziyang Duan, Subhra Bose, Charles A. Shoniregun, P...