Sciweavers

469 search results - page 21 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
HASE
1998
IEEE
13 years 11 months ago
Design for Constraint Violation Detection in Safety-Critical Systems
In safety-critical systems, certain safety constraints must be satisfied before an operation can be performed. Such constraints typically depend on the state of the system at the ...
Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsa...
COMPSAC
2001
IEEE
13 years 11 months ago
Certificate Based Authorization Simulation System
Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...
Jie Dai, Jim Alves-Foss
FLAIRS
2006
13 years 8 months ago
Design, Implementation and Performance Analysis of Pervasive Surveillance Networks
Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system are expresse...
Amit Goradia, Zhiwei Cen, Clayton Haffner, Ning Xi...
CSCW
1999
ACM
13 years 7 months ago
Voice Loops as Coordination Aids in Space Shuttle Mission Control
Voice loops, an auditory groupware technology, are essential coordination support tools for experienced practitioners in domains such as air traffic management, aircraft carrier o...
Emily S. Patterson, Jennifer Watts-Perotti, David ...
FUIN
2007
110views more  FUIN 2007»
13 years 7 months ago
Controllable Delay-Insensitive Processes
Abstract. Josephs and Udding’s DI-Algebra offers a convenient way of specifying and verifying designs that must rely upon delay-insensitive signalling between modules (asynchrono...
Mark B. Josephs, Hemangee K. Kapoor