Sciweavers

1099 search results - page 159 / 220
» A Formal Approach to Domain-Oriented Software Design Environ...
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 6 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
PUC
2006
117views more  PUC 2006»
14 years 11 months ago
AMUN: an autonomic middleware for the Smart Doorplate Project
Abstract. We envision future office buildings that partly or fully implement a flexible office organization where office rooms are dynamically assigned to currently present employe...
Wolfgang Trumler, Jan Petzold, Faruk Bagci, Theo U...
VLSI
2010
Springer
14 years 6 months ago
SESAM extension for fast MPSoC architectural exploration and dynamic streaming applications
Future systems will have to support multiple and concurrent dynamic compute-intensive applications, while respecting real-time and energy consumption constraints. To overcome these...
Nicolas Ventroux, Tanguy Sassolas, Raphael David, ...
IUI
2012
ACM
13 years 7 months ago
Automatic reverse engineering of interactive dynamic web applications to support adaptation across platforms
The effort and time required to develop user interface models has been one of the main limitations to the adoption of model-based approaches, which enable intelligent processing o...
Federico Bellucci, Giuseppe Ghiani, Fabio Patern&o...
DSOM
2007
Springer
15 years 6 months ago
Virtualization-Based Techniques for Enabling Multi-tenant Management Tools
As service providers strive to improve the quality and efficiency of their IT (information technology) management services, the need to adopt a standard set of tools and processes...
Chang-Hao Tsai, Yaoping Ruan, Sambit Sahu, Anees S...