Sciweavers

3395 search results - page 493 / 679
» Designs, Disputes and Strategies
Sort
View
SAFECOMP
2007
Springer
14 years 3 months ago
Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System
A strategy and relating activities of a software safety analysis (SSA) are presented for the software of a digital reactor protection system where software modules in the design de...
Gee-Yong Park, Jang-Soo Lee, Se Woo Cheon, Kee-Cho...
SSS
2007
Springer
14 years 3 months ago
Stabilization in Dynamic Systems with Varying Equilibrium
System design often explores optimality of performance. What is optimal is, however, often not predefined or static in most cases, because it is affected by the context of operat...
Hui Cao, Anish Arora
ACSAC
2006
IEEE
14 years 3 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
ACSAC
2006
IEEE
14 years 3 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
AINA
2006
IEEE
14 years 3 months ago
HyMoNet: a peer-to-peer hybrid multicast overlay network for efficient live media streaming
This paper presents HyMoNet, a peer-to-peer hybrid multicast overlay network for efficient live media streaming. The system comprises two parts: service infrastructure and user sp...
Bin Chang, Yuanchun Shi, Nan Zhang