Sciweavers

2212 search results - page 392 / 443
» Automated software wrapping
Sort
View
WSC
2007
13 years 10 months ago
Code analysis and CS-XML
The automated analysis of model specifications is an area that historically receives little attention in the simulation research community but which can offer significant bene...
Kara A. Olson, C. Michael Overstreet, E. Joseph De...
ATAL
2008
Springer
13 years 9 months ago
LS/ABPM - an agent-powered suite for goal-oriented autonomic BPM
In this paper we shortly describe the Living Systems Autonomic Business Process Management (LS/ABPM) software product. LS/ABPM is an integrated environment, based on J2EE, Eclipse...
Giovanni Rimassa, Martin E. Kernland, Roberto Ghiz...
EIT
2008
IEEE
13 years 9 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
CAINE
2007
13 years 9 months ago
A Novel Peak Detection Algorithm for Use in the Study of Machining Chip Segmentation
The study of how metal deforms and flows as parts are machined yields important insights into the metal cutting process. Improvements in high-speed digital imaging and image proce...
Eric Whitenton, Robert Ivester, Jarred Heigel
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 9 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray