Sciweavers

1056 search results - page 132 / 212
» Mapping an Application to a Control Architecture: Specificat...
Sort
View
ISORC
2005
IEEE
14 years 1 months ago
Adaptable Situation-Aware Secure Service-Based (AS3) Systems
Service-based systems have many applications, including collaborative research and development, e-business, health care, environmental control, military applications, and homeland...
Stephen S. Yau, Hasan Davulcu, Supratik Mukhopadhy...
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
14 years 2 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
14 years 2 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speciï¬...
Anooshiravan Saboori, Christoforos N. Hadjicostis
ICCS
2005
Springer
14 years 1 months ago
The Development of Dependable and Survivable Grids
Abstract. Grids should not just be facilitating advances in science and engineering; rather they should also be making an impact on our daily lives by enabling sophisticated applic...
Andrew S. Grimshaw, Marty A. Humphrey, John C. Kni...
HPCA
2008
IEEE
14 years 8 months ago
Automated microprocessor stressmark generation
Estimating the maximum power and thermal characteristics of a processor is essential for designing its power delivery system, packaging, cooling, and power/thermal management sche...
Ajay M. Joshi, Lieven Eeckhout, Lizy Kurian John, ...