Sciweavers

558 search results - page 70 / 112
» DiscoTect: A System for Discovering Architectures from Runni...
Sort
View
DAC
2008
ACM
13 years 11 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
13 years 1 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
METAINFORMATICS
2004
Springer
14 years 3 months ago
Describing Use Cases with Activity Charts
Abstract. The Model-Driven Development (MDD) describes and maintains models of the system under development. The Unified Modeling Language (UML) supports a set of semantics and no...
Jesús Manuel Almendros-Jiménez, Luis...
ESAW
2009
Springer
14 years 4 months ago
Cooperative Sign Language Tutoring: A Multiagent Approach
Sign languages can be learned effectively only with frequent feedback from an expert in the field. The expert needs to watch a performed sign, and decide whether the sign has bee...
Ilker Yildirim, Oya Aran, Pinar Yolum, Lale Akarun
SACMAT
2006
ACM
14 years 3 months ago
Information flow property preserving transformation of UML interaction diagrams
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
Fredrik Seehusen, Ketil Stølen