Sciweavers

1352 search results - page 209 / 271
» Designing Security Requirements Models Through Planning
Sort
View
VLSID
1999
IEEE
93views VLSI» more  VLSID 1999»
14 years 1 months ago
Spec-Based Repeater Insertion and Wire Sizing for On-chip Interconnect
Recently Lillis, et al. presented an elegant dynamic programming approach to RC interconnect delay optimization through driver sizing, repeater insertion, and, wire sizing which e...
Noel Menezes, Chung-Ping Chen
JVCA
2002
180views more  JVCA 2002»
13 years 8 months ago
A programming environment for behavioural animation
Behavioural models offer the ability to simulate autonomous agents like organisms and living beings. Psychological studies have showed that the human behaviour can be described by...
Frédéric Devillers, Stéphane ...
ENVSOFT
2006
102views more  ENVSOFT 2006»
13 years 8 months ago
Gas exploration beyond the shelf break: An oceanographic challenge
Norway's second largest gas field, Ormen Lange, is located 140 km west off Kristiansund at an unprecedented depth when it comes to exploration. It will be the first Norwegian...
Ø. Thiem, J. Berntsen, T. Eldevik, G. Alend...
WISEC
2010
ACM
14 years 3 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
NSDI
2007
13 years 11 months ago
An Experimentation Workbench for Replayable Networking Research
The network and distributed systems research communities have an increasing need for “replayable” research, but our current experimentation resources fall short of reaching th...
Eric Eide, Leigh Stoller, Jay Lepreau