Sciweavers

2429 search results - page 183 / 486
» Using Aspects to Design a Secure System
Sort
View
130
Voted
WSC
1997
15 years 3 months ago
The Four Phase Method for Modelling Complex Systems
This paper investigates an attempt to combine different simulation tools in order to build a simulation environment that can be used to model complex system behaviour. The compone...
Hamad I. Odhabi, Ray J. Paul, Robert D. Macredie
103
Voted
ICC
2007
IEEE
107views Communications» more  ICC 2007»
15 years 9 months ago
Evaluation of Security for DSSS Under Repeater Jamming
—Direct sequence spread spectrum (DSSS) technique has been widely used in both military communications and commercial communications. On the other hand, it is a challenge to both...
Hang Wang, Jingbo Guo, Zanji Wang
120
Voted
DSD
2006
IEEE
113views Hardware» more  DSD 2006»
15 years 8 months ago
An Asynchronous PLA with Improved Security Characteristics
Programmable logic arrays (PLAs) present an alternative to logic-gate based design. We propose the transistor level structure of a PLA for single-rail asynchronous applications. T...
Petros Oikonomakos, Simon W. Moore
SPLC
2010
15 years 4 months ago
An Approach for Developing Component-Based Groupware Product Lines Using the Groupware Workbench
Groupware are computer-based systems designed to support groups of people working together providing a shared environment. Given that developing this kind of application is not a t...
Bruno Gadelha, Elder Cirilo, Marco Aurélio ...
105
Voted
DAC
2005
ACM
15 years 4 months ago
A watermarking system for IP protection by a post layout incremental router
In this paper, we introduce a new watermarking system for IP protection on post-layout design phase. Firstly the copyright is encrypted by DES (Data Encryption Standard) and then ...
Tingyuan Nie, Tomoo Kisaka, Masahiko Toyonaga