Sciweavers

410 search results - page 60 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
STOC
2010
ACM
227views Algorithms» more  STOC 2010»
14 years 1 months ago
On the Round Complexity of Covert Computation
In STOC’05, von Ahn, Hopper and Langford introduced the notion of covert computation. In covert computation, a party runs a secure computation protocol over a covert (or stegano...
Vipul Goyal and Abhishek Jain
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
14 years 3 months ago
A Visualization Framework for Task-Oriented Modeling Using UML
— The UML is a collection of 13 diagram notations to describe different views of a software system. The existing diagram types display model elements and their relations. Softwar...
Christian F. J. Lange, Martijn A. M. Wijns, Michel...
FDL
2004
IEEE
14 years 21 days ago
SystemC and OCAPI-xl Based System-Level Design for Reconfigurable Systems-on-Chip
Reconfigurability is becoming an important part of System-on-Chip (SoC) design to cope with the increasing demands for simultaneous flexibility and computational power. Current ha...
Kari Tiensyrjä, Miroslav Cupák, Kostas...
CIMCA
2005
IEEE
13 years 11 months ago
Customised Customer Support Using a Soft Computing Approach
This paper describes the research and development of a methodology to identify the type of information required by the service advisor (CSA) within customer contact centre (CCC) e...
S. Shah, Rajkumar Roy, Ashutosh Tiwari, Basim Maje...
DATE
2010
IEEE
154views Hardware» more  DATE 2010»
13 years 10 months ago
Computing robustness of FlexRay schedules to uncertainties in design parameters
Abstract--In the current environment of rapidly changing invehicle requirements and ever-increasing functional content for automotive EE systems, there are several sources of uncer...
Arkadeb Ghosal, Haibo Zeng, Marco Di Natale, Yakov...