Sciweavers

1460 search results - page 25 / 292
» Very Lightweight Requirements Modeling
Sort
View
CCS
2008
ACM
13 years 10 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
PERCOM
2008
ACM
14 years 8 months ago
Automatic form filling on mobile devices
Filling out forms of web based services on mobile devices is a very time consuming and frustrating task for users because of the limited text input capabilities. This is a critica...
Enrico Rukzio, Chie Noda, Alexander De Luca, John ...
SEKE
2007
Springer
14 years 2 months ago
A Model-driven Approach to Architecting Secure Software
A software architecture provides a high-level description of a software solution in terms of the structure, topology, and interactions between its principal components. While a nu...
Ebenezer A. Oladimeji, Sam Supakkul, Lawrence Chun...
ICECCS
2006
IEEE
126views Hardware» more  ICECCS 2006»
14 years 2 months ago
Model-based Design of Distributed Collaborative Bioinformatics Processes in the jABC
Abstract— Our approach to the model-driven collaborative design of workflows for bioinformatic applications uses the jABC [6] for model driven mediation and choreography to comp...
Tiziana Margaria, Christian Kubczak, Marc Njoku, B...
ANSS
1997
IEEE
14 years 29 days ago
Towards the Design of a Heterogeneous Hierarchical Machine: A Simulation Approach
HPAM Sim is an execution-driven simulator of heterogeneous machines. HPAM Sim allows the simulation of target machines consisting of different processors and interconnection netwo...
Zina Ben-Miled, José A. B. Fortes, Rudolf E...