Sciweavers

1028 search results - page 29 / 206
» Using Attack Graphs to Design Systems
Sort
View
MBUI
2004
133views User Interface» more  MBUI 2004»
13 years 11 months ago
From Models to Interactive Systems Tool Support and XIML
user interface application model dialogue model Design Design Transformation by patterns Transformation by patterns class diagram task model l use model b.-object model device mod...
Peter Forbrig, Anke Dittmar, Daniel Reichart, Dani...
WER
2007
Springer
14 years 4 months ago
Towards Variability Design as Decision Boundary Placement
Complex information systems have numerous design variables that are systematically decided upon during the design process. In high-variability systems, some of these decisions are...
Catalin Bidian, Eric S. K. Yu
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
14 years 2 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
TCOS
2010
13 years 5 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin
AGTIVE
2007
Springer
14 years 2 days ago
Adaptable Support for Queries and Transformations for the DRAGOS Graph-Database
Abstract. The DRAGOS database eases the development of graphbased applications by providing a uniform graph-oriented data storage facility. In this paper, we extend the existing da...
Erhard Weinell