Sciweavers

933 search results - page 74 / 187
» How compilers and tools differ for embedded systems
Sort
View
HCSE
2010
13 years 6 months ago
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats end...
Shamal Faily, Ivan Flechais
ICIP
2005
IEEE
14 years 10 months ago
Resistance analysis of scalable video fingerprinting systems under fair collusion attacks
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digi...
H. Vicky Zhao, K. J. Ray Liu
IESS
2007
Springer
110views Hardware» more  IESS 2007»
14 years 3 months ago
Run-Time efficient Feasibility Analysis of Uni-Processor Systems with Static Priorities
: The performance of feasibility tests is crucial in many applications. When using feasibility tests online only a limited amount of analysis time is available. Run-time efficiency...
Karsten Albers, Frank Bodmann, Frank Slomka
CAV
2009
Springer
132views Hardware» more  CAV 2009»
14 years 9 months ago
Image Computation for Polynomial Dynamical Systems Using the Bernstein Expansion
This paper is concerned with the problem of computing the image of a set by a polynomial function. Such image computations constitute a crucial component in typical tools for set-b...
Thao Dang, David Salinas
ACSAC
2002
IEEE
14 years 1 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...