Sciweavers

438 search results - page 46 / 88
» Defending Critical Infrastructure
Sort
View
WSPI
2004
13 years 10 months ago
Grounding Knowledge of Engineering Applications in Systematic Terms
In the main research of internet-computing enabled knowledge management, we use some of the most advanced research scenarios, arguing that we critically need a system approach to q...
Ying Liu 0002, Jin Yu
WISES
2003
13 years 10 months ago
Built-In Fault Injectors - The Logical Continuation of BIST?
— With the increasing number of embedded computer systems being used in safety critical applications the testing and assessment of a system’s fault tolerance properties become ...
Andreas Steininger, Babak Rahbaran, Thomas Handl
ISLPED
2010
ACM
205views Hardware» more  ISLPED 2010»
13 years 9 months ago
Peak power modeling for data center servers with switched-mode power supplies
Accurately modeling server power consumption is critical in designing data center power provisioning infrastructure. However, to date, most research proposals have used average CP...
David Meisner, Thomas F. Wenisch
JTAER
2006
78views more  JTAER 2006»
13 years 8 months ago
The Social Dimensions of the Security of Internet banking
This paper examines the users' perspective on the security of Internet banking in Australia within the social context. This user-centered design approach supplements the tech...
Supriya Singh
JSW
2007
116views more  JSW 2007»
13 years 8 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...