Sciweavers

232 search results - page 7 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
ICSE
2009
IEEE-ACM
13 years 7 months ago
SmartTutor: Creating IDE-based interactive tutorials via editable replay
Interactive tutorials, like Eclipse's cheat sheets, are good for novice programmers to learn how to perform tasks (e.g., checking out a CVS project) in an Integrated Developm...
Ying Zhang, Gang Huang, Nuyun Zhang, Hong Mei
ITNG
2008
IEEE
14 years 4 months ago
Implementing and Validating an Environmental and Health Monitoring System
In this paper the authors describe the implementation and validation of a prototype of an environmental and health monitoring system based on a Wireless Sensor Network (WSN). The ...
Marco Messina, Yen Yang Lim, Elaine Lawrence, Don ...
KBSE
2007
IEEE
14 years 4 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
ISCAS
1999
IEEE
116views Hardware» more  ISCAS 1999»
14 years 2 months ago
A coefficient segmentation algorithm for low power implementation of FIR filters
The authors present a multiplication algorithm for low power implementation of digital filters on CMOS based digital signal processing systems. The algorithm decomposes individual...
Ahmet T. Erdogan, Tughrul Arslan
ISSA
2008
13 years 11 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche