Sciweavers

2169 search results - page 389 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
AOSD
2010
ACM
14 years 3 months ago
Disambiguating aspect-oriented security policies
Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
Micah Jones, Kevin W. Hamlen
3DIC
2009
IEEE
279views Hardware» more  3DIC 2009»
14 years 3 months ago
Compact modelling of Through-Silicon Vias (TSVs) in three-dimensional (3-D) integrated circuits
Abstract—Modeling parasitic parameters of Through-SiliconVia (TSV) structures is essential in exploring electrical characteristics such as delay and signal integrity (SI) of circ...
Roshan Weerasekera, Matt Grange, Dinesh Pamunuwa, ...
CHI
2009
ACM
14 years 3 months ago
Pathfinder: an online collaboration environment for citizen scientists
For over a century, citizen scientists have volunteered to collect huge quantities of data for professional scientists to analyze. We designed Pathfinder, an online environment th...
Kurt Luther, Scott Counts, Kristin B. Stecher, Aar...
GLOBECOM
2009
IEEE
14 years 3 months ago
QOMB: A Wireless Network Emulation Testbed
—In this paper we present QOMB, a testbed we designed and implemented for the evaluation of wireless network systems, protocols and applications. The testbed uses the wireless ne...
Razvan Beuran, Lan Tien Nguyen, Toshiyuki Miyachi,...
CODES
2008
IEEE
14 years 3 months ago
Symbolic voter placement for dependability-aware system synthesis
This paper presents a system synthesis approach for dependable embedded systems. The proposed approach significantly extends previous work by automatically inserting fault detect...
Felix Reimann, Michael Glabeta, Martin Lukasiewycz...