Sciweavers

1028 search results - page 138 / 206
» Using Attack Graphs to Design Systems
Sort
View
IESS
2007
Springer
162views Hardware» more  IESS 2007»
14 years 3 months ago
Automatic Parallelization of Sequential Specifications for Symmetric MPSoCs
Abstract This paper presents an embedded system design toolchain for automatic generation of parallel code runnable on symmetric multiprocessor systems from an initial sequential s...
Fabrizio Ferrandi, Luca Fossati, Marco Lattuada, G...
ICNP
2007
IEEE
14 years 4 months ago
Network Court Protocol and Malicious Node Conviction
- A Network Court Protocol is designed for malicious node conviction based on information from network node accusing and testifying operations, which are formally modeled by algebr...
Na Li, David Lee
CAV
2010
Springer
286views Hardware» more  CAV 2010»
13 years 9 months ago
ABC: An Academic Industrial-Strength Verification Tool
ABC is a public-domain system for logic synthesis and formal verification of binary logic circuits appearing in synchronous hardware designs. ABC combines scalable logic transforma...
Robert K. Brayton, Alan Mishchenko
CCS
2009
ACM
14 years 4 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
AIED
2005
Springer
14 years 3 months ago
The eXtensible Tutor Architecture: A New Foundation for ITS
The eXtensible Tutor Architecture (XTA) was designed as a platform for creating and deploying many types of Intelligent Tutoring Systems across many different platforms. The XTA pr...
Goss Nuzzo-Jones, Jason A. Walonoski, Neil T. Heff...