Sciweavers

205 search results - page 35 / 41
» Checking Architectural and Implementation Constraints for Do...
Sort
View
AUSDM
2008
Springer
221views Data Mining» more  AUSDM 2008»
13 years 9 months ago
Indoor Location Prediction Using Multiple Wireless Received Signal Strengths
This paper presents a framework for indoor location prediction system using multiple wireless signals available freely in public or office spaces. We first proabstract architectur...
Kha Tran, Dinh Q. Phung, Brett Adams, Svetha Venka...
EMSOFT
2004
Springer
14 years 28 days ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
TES
2001
Springer
13 years 12 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
SACMAT
2009
ACM
14 years 2 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
ISCAS
2005
IEEE
166views Hardware» more  ISCAS 2005»
14 years 1 months ago
Extending SystemC to support mixed discrete-continuous system modeling and simulation
—Systems on chip are more and more heterogeneous and include software, analog/RF and digital hardware, and non-electronic components such as sensors or actuators. The design and ...
Alain Vachoux, Christoph Grimm, Karsten Einwich