Sciweavers

3133 search results - page 48 / 627
» Difference systems of sets and cyclotomy
Sort
View
APSEC
2009
IEEE
13 years 8 months ago
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification
Abstract--Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
CORR
2010
Springer
163views Education» more  CORR 2010»
13 years 8 months ago
Design of QoS-aware Provisioning Systems
We present an architecture of a hosting system consisting of a set of hosted Web Services subject to QoS constraints, and a certain number of servers used to run users demand. The ...
Michele Mazzucco, Manuel Mazzara, Nicola Dragoni
PE
2010
Springer
124views Optimization» more  PE 2010»
13 years 5 months ago
High-level approach to modeling of observed system behavior
Current computer systems and communication networks tend to be highly complex, and they typically hide their internal structure from their users. Thus, for selected aspects of cap...
Thomas Begin, Alexandre Brandwajn, Bruno Baynat, B...
DAC
2009
ACM
13 years 8 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
HCI
2009
13 years 8 months ago
Impact on Performance and Process by a Social Annotation System: A Social Reading Experiment
Social annotation systems such as SparTag.us and del.icio.us have been designed to encourage individual reading and marking behaviors that, when shared, accumulate to build collect...
Les Nelson, Gregorio Convertino, Peter Pirolli, Li...