Sciweavers

3999 search results - page 58 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
15 years 9 months ago
Replicating and Sharing Computer Security Laboratory Environments
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...
DAC
2000
ACM
16 years 3 months ago
System chip test: how will it impact your design?
A major challenge in realizing core-based system chips is the adoption and design-in of adequate test and diagnosis strategies. This tutorial paper discusses the specific challeng...
Yervant Zorian, Erik Jan Marinissen
HASE
2008
IEEE
15 years 2 months ago
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications
Designing safety-critical systems is a complex process, and especially when the design is carried out at different f abstraction where the correctness of the design at one level i...
Kohei Sakurai, Péter Bokor, Neeraj Suri
SACMAT
2009
ACM
15 years 9 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
JCISE
2002
129views more  JCISE 2002»
15 years 2 months ago
Modeling Information Needs in Engineering Databases Using Tacit Knowledge
Online resources of engineering design information are a critical resource for practicing engineers. These online resources often contain references and content associated with te...
Shuang Song, Andy Dong, Alice M. Agogino