Sciweavers

1328 search results - page 180 / 266
» Common Knowledge
Sort
View
ACSAC
1998
IEEE
14 years 1 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
ICSE
1999
IEEE-ACM
14 years 1 months ago
Product-Line Architectures in Industry: A Case Study
In this paper, a case study investigating the experiences from using product-line architectures is presented involving two swedish companies, Axis Communications AB and Securitas ...
Jan Bosch
ICCAD
1998
IEEE
109views Hardware» more  ICCAD 1998»
14 years 1 months ago
CORDS: hardware-software co-synthesis of reconfigurable real-time distributed embedded systems
Field programmable gate arrays (FPGAs) are commonly used in embedded systems. Although it is possible to reconfigure some FPGAs while an embedded system is operational, this featu...
Robert P. Dick, Niraj K. Jha
TPHOL
1998
IEEE
14 years 1 months ago
The Village Telephone System: A Case Study in Formal Software Engineering
In this paper we illustrate the use of formal methods in the development of a benchmark application we call the Village Telephone System which is characteristic of a class of netwo...
Karthikeyan Bhargavan, Carl A. Gunter, Elsa L. Gun...
SPATIALCOGNITION
1998
Springer
14 years 1 months ago
The Impact of Exogenous Factors on Spatial Coding in Perception and Memory
In the course of acquiring knowledge about layouts and maps spatial information can undergo considerable changes and distortions, which systematically affect knowledge-based judgme...
Jörg Gehrke, Bernhard Hommel