Sciweavers

883 search results - page 22 / 177
» Getting the right design and the design right
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
IS
2007
13 years 8 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini
AUTOMATICA
1999
72views more  AUTOMATICA 1999»
13 years 8 months ago
Observer-controller design for cranes via Lyapunov equivalence
We consider a linearized parameter-varying model of a planar crane and show how a controller can be designed, following the state-feedback stabilization technique for time-varying...
Alessandro Giua, Carla Seatzu, Giampaolo Usai
COR
2006
112views more  COR 2006»
13 years 8 months ago
A continuous approach to considering uncertainty in facility design
This paper presents a formulation of the facilities block layout problem which explicitly considers uncertainty in material handling costs on a continuous scale by use of expected...
Bryan A. Norman, Alice E. Smith
IWC
2007
119views more  IWC 2007»
13 years 8 months ago
Dependable domestic systems design: A socio-technical approach
This paper describes a model that defines the attributes of domestic systems that lead to system dependability and a user-oriented specification method for support systems based...
Ian Sommerville, Guy Dewsbury