Sciweavers

1028 search results - page 44 / 206
» Using Attack Graphs to Design Systems
Sort
View
IEEECIT
2009
IEEE
14 years 5 months ago
Clustering of Software Systems Using New Hybrid Algorithms
—Software clustering is a method for increasing software system understanding and maintenance. Software designers, first use MDG graph to model the structure of software system. ...
Ali Safari Mamaghani, Mohammad Reza Meybodi
JCP
2008
119views more  JCP 2008»
13 years 10 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
ICCS
2004
Springer
14 years 3 months ago
Data Driven Design Optimization Methodology Development and Application
The Data Driven Design Optimization Methodology (DDDOM) is a Dynamic Data Driven Application System (DDDAS) developed for engineering design optimization. The DDDOM synergizes expe...
H. Zhao, D. Knight, E. Taskinoglu, V. Jovanovic
CORR
2004
Springer
80views Education» more  CORR 2004»
13 years 10 months ago
Notes On The Design Of An Internet Adversary
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
David S. H. Rosenthal, Petros Maniatis, Mema Rouss...
CASES
2010
ACM
13 years 7 months ago
Optimizing energy to minimize errors in dataflow graphs using approximate adders
Approximate arithmetic is a promising, new approach to lowenergy designs while tackling reliability issues. We present a method to optimally distribute a given energy budget among...
Zvi M. Kedem, Vincent John Mooney, Kirthi Krishna ...