Sciweavers

4150 search results - page 258 / 830
» A Practical Approach to Model Extension
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 11 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
FMCO
2005
Springer
173views Formal Methods» more  FMCO 2005»
15 years 10 months ago
Cluster-Based LTL Model Checking of Large Systems
Abstract. In recent years a bundle of parallel and distributed algorithms for verification of finite state systems has appeared. We survey distributed-memory enumerative LTL mode...
Jiri Barnat, Lubos Brim, Ivana Cerná
CAV
2004
Springer
128views Hardware» more  CAV 2004»
15 years 10 months ago
Proving More Properties with Bounded Model Checking
Bounded Model Checking, although complete in theory, has been thus far limited in practice to falsification of properties that were not invariants. In this paper we propose a term...
Mohammad Awedh, Fabio Somenzi
MICCAI
2004
Springer
15 years 10 months ago
Statistical Shape Modelling of the Levator Ani with Thickness Variation
The levator ani is vulnerable to injury during childbirth and effective surgical intervention requires full knowledge of the morphology and mechanical properties of the muscle stru...
Su-Lin Lee, Paramate Horkaew, Ara Darzi, Guang-Zho...
AGTIVE
2007
Springer
15 years 8 months ago
Generating Domain-Specific Model Editors with Complex Editing Commands
Abstract. Domain specific modeling languages are of increasing importance for the development of software and other systems. Meta tools are needed to support rapid development of d...
Gabriele Taentzer, André Crema, René...