Sciweavers

1036 search results - page 116 / 208
» Design methods as discourse on practice
Sort
View
WCNC
2008
IEEE
14 years 2 months ago
On the Deployment of Mobile Trusted Modules
— In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpo...
Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper
SEFM
2007
IEEE
14 years 2 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi
ICFEM
2007
Springer
14 years 1 months ago
Formal Engineering of XACML Access Control Policies in VDM++
We present a formal, tool-supported approach to the design and maintenance of access control policies expressed in the eXtensible Access Control Markup Language (XACML). Our aim is...
Jeremy Bryans, John S. Fitzgerald
ICRA
2006
IEEE
130views Robotics» more  ICRA 2006»
14 years 1 months ago
Time Optimal Control for Quadruped Walking Robots
- Time optimal control method for quadruped walking robots are developed and installed into a practical robot system. Each leg is modeled as a two link manipulator whose time optim...
Hisashi Osumi, Shogo Kamiya, Hirokazu Kato, Kazuno...
MEMOCODE
2006
IEEE
14 years 1 months ago
802.11a transmitter: a case study in microarchitectural exploration
Hand-held devices have rigid constraints regarding power dissipation and energy consumption. Whether a new functionality can be supported often depends upon its power requirements...
Nirav Dave, Michael Pellauer, S. Gerding, Arvind