Sciweavers

9124 search results - page 37 / 1825
» Requirements-Based Design Evaluation
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 4 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
HICSS
2002
IEEE
82views Biometrics» more  HICSS 2002»
14 years 3 months ago
The IT Support for Acquired Brain Injury Patients - the Design and Evaluation of a New Software Package
The problems of producing a software system to assist in the rehabilitation of people who have suffered serious traumatic brain injuries are described. In addition to this primary...
Micaela Serra, Jon C. Muzio
CN
2008
126views more  CN 2008»
13 years 11 months ago
Design and evaluation of flow handoff signalling for multihomed mobile nodes in wireless overlay networks
With the increasing deployment of wireless overlay networks, a mobile node with a range of network interfaces can be connected to multiple heterogeneous or homogeneous access netw...
Qi Wang, Robert Atkinson, John Dunlop
CCECE
2006
IEEE
14 years 5 months ago
Security Design Patterns: Survey and Evaluation
Security design patterns have been proposed recently as a tool for the improvement of software security during the architecture and design phases. Since the apperance of this rese...
Marc-André Laverdière, Azzam Mourad,...
AIEDAM
2000
98views more  AIEDAM 2000»
13 years 10 months ago
Generating and evaluating designs and plans for microwave modules
This paper describes the process planning techniques we developed for use in an Integrated Product and Process Design (IPPD) tool for the design and manufacture of microwave trans...
Dana S. Nau, Michael O. Ball, John S. Baras, Abdur...