Sciweavers

418 search results - page 54 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
COOPIS
2002
IEEE
14 years 15 days ago
Discovering Emergent Virtual Work Processes in Collaborative Systems
The design of virtual workplaces that can support virtual work processes has traditionally been either ad-hoc, or has been influenced by the top-down approaches, such as ‘virtua...
Simeon J. Simoff, Robert P. Biuk-Aghai
CODASPY
2012
12 years 3 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
TII
2010
146views Education» more  TII 2010»
13 years 2 months ago
A Flexible Design Flow for Software IP Binding in FPGA
Software intellectual property (SWIP) is a critical component of increasingly complex field programmable gate arrays (FPGA)-based system-on-chip (SOC) designs. As a result, develop...
Michael A. Gora, Abhranil Maiti, Patrick Schaumont
SQJ
2008
94views more  SQJ 2008»
13 years 7 months ago
Simulation-based analysis of UML statechart diagrams: methods and case studies
- We present a comprehensive UML statechart diagram analysis framework. This framework allows one to progressively perform different analysis operations to analyze UML statechart d...
Jiexin Lian, Zhaoxia Hu, Sol M. Shatz
ENTCS
2006
180views more  ENTCS 2006»
13 years 7 months ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...