Sciweavers

215 search results - page 29 / 43
» Toward Verified Execution Environments
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
RSP
2008
IEEE
118views Control Systems» more  RSP 2008»
14 years 1 months ago
Functional DIF for Rapid Prototyping
Dataflow formalisms have provided designers of digital signal processing systems with optimizations and guarantees to arrive at quality prototypes quickly. As system complexity in...
William Plishker, Nimish Sane, Mary Kiemb, Kapil A...
DEXAW
2007
IEEE
92views Database» more  DEXAW 2007»
14 years 1 months ago
Mapping of heterogeneous schemata, business structures, and terminologies
The current effort to extend the power of information systems by making use of the semantics associated with terms and structures has resulted in a need to establish correspondenc...
Domenico Beneventano, Sabina El Haoum, Daniele Mon...
BIRTHDAY
2008
Springer
13 years 9 months ago
Approximating Behaviors in Embedded System Design
Embedded systems are electronic devices that function in the context of a physical environment, by sensing and reacting to a set of stimuli. To simplify the design of embedded syst...
Roberto Passerone, Alberto L. Sangiovanni-Vincente...
JCM
2007
102views more  JCM 2007»
13 years 7 months ago
A Setup for the Evaluation of MUSIC and LMS Algorithms for a Smart Antenna System
— This paper presents practical design of a smart antenna system based on direction-of-arrival estimation and adaptive beamforming. Direction-of-arrival (DOA) estimation is based...
Raed M. Shubair, Mahmoud Al-Qutayri, Jassim M. Sam...