Sciweavers

2337 search results - page 375 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
14 years 2 months ago
Storage Model for CDA Documents
The Health Level 7 Clinic Document Architecture (CDA) is an XML-based document markup standard that specifies the hierarchical structure and semantics of “clinical documents” ...
Zheng Liang, Peter Bodorik, Michael Shepher
MOBISYS
2008
ACM
14 years 8 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
IMC
2009
ACM
14 years 3 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
RTAS
2008
IEEE
14 years 3 months ago
Hybrid Timing Analysis of Modern Processor Pipelines via Hardware/Software Interactions
Embedded systems are often subject to constraints that require determinism to ensure that task deadlines are met. Such systems are referred to as real-time systems. Schedulability...
Sibin Mohan, Frank Mueller
DATE
2005
IEEE
144views Hardware» more  DATE 2005»
14 years 2 months ago
Context Sensitive Performance Analysis of Automotive Applications
Accurate timing analysis is key to efficient embedded system synthesis and integration. While industrial control software systems are developed using graphical models, such as Ma...
Jan Staschulat, Rolf Ernst, Andreas Schulze, Fabia...