Sciweavers

3999 search results - page 64 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
117
Voted
ACSAC
2004
IEEE
15 years 6 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
RTS
2006
115views more  RTS 2006»
15 years 2 months ago
Resource access control for dynamic priority distributed real-time systems
Many of today's complex computer applications are being modeled and constructed using the principles inherent to real-time distributed object systems. In response to this dem...
Chen Zhang, David Cordes
CORR
2008
Springer
83views Education» more  CORR 2008»
15 years 2 months ago
Modeling of a piezoelectric micro-scanner
Micro-scanners have been widely used in many optical applications. The micro-scanner presented in this paper uses multimorph-type bending actuators to tilt a square plate mirror. ...
A. Chaehoi, M. Begbie, D. Cornez, K. Kirk
KER
2007
90views more  KER 2007»
15 years 2 months ago
Ontology-based models in pervasive computing systems
Pervasive computing is by its nature open and extensible, and must integrate the information from a diverse range of sources. This leads to a problem of information exchange, so s...
Juan Ye, Lorcan Coyle, Simon Dobson, Paddy Nixon
DAC
1998
ACM
16 years 3 months ago
Design and Specification of Embedded Systems in Java Using Successive, Formal Refinement
Successive, formal refinement is a new approach for specification of embedded systems using a general-purpose programming language. Systems are formally modeled as Abstractable Sy...
James Shin Young, Josh MacDonald, Michael Shilman,...