Sciweavers

1352 search results - page 84 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ICN
2009
Springer
13 years 6 months ago
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits
It is essential that a monitoring system is being designed with performance and scalability in mind. But due to the diversity and complexity of both the monitoring and the monitore...
Abdelkader Lahmadi, Laurent Andrey, Olivier Festor
ICOIN
2001
Springer
14 years 1 months ago
A 3D Modeling System for Creative Design
We propose a new approach to easily creating 3 0 geometric models. A technique called interactive evolutionary computation (IEC) is introduced to accelerate user’s invention and...
Hiroaki Nishino, Hideyuki Takagi, Sung-Bae Cho, Ko...
DEXA
2003
Springer
117views Database» more  DEXA 2003»
14 years 2 months ago
A Toolkit and Methodology to Support the Collaborative Development and Reuse of Engineering Models
Abstract. Engineering design is a knowledge intensive activity. Design is characterized as comprising a number of phases from requirements to detailed specification. Transitions be...
Zdenek Zdráhal, Paul Mulholland, Michael Va...
SAC
2010
ACM
14 years 3 months ago
Towards fine-grained and application-centric access control for wireless sensor networks
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...
SAFECOMP
2000
Springer
14 years 15 days ago
Speeding-Up Fault Injection Campaigns in VHDL Models
Abstract. Simulation-based Fault Injection in VHDL descriptions is increasingly common due to the popularity of top-down design flows exploiting this language. This paper presents ...
B. Parrotta, Maurizio Rebaudengo, Matteo Sonza Reo...