Sciweavers

144 search results - page 13 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
CMSB
2006
Springer
15 years 2 months ago
Probabilistic Model Checking of Complex Biological Pathways
Abstract. Probabilistic model checking is a formal verification technique that has been successfully applied to the analysis of systems from a broad range of domains, including sec...
John Heath, Marta Z. Kwiatkowska, Gethin Norman, D...
ISBI
2002
IEEE
15 years 11 months ago
Statistical shape models for segmentation and structural analysis
Biomedical imaging of large patient populations, both cross-sectionally and longitudinally, is becoming a standard technique for noninvasive, in-vivo studies of the pathophysiolog...
Guido Gerig, Martin Andreas Styner, Gábor S...
ESEM
2007
ACM
15 years 2 months ago
Effort Prediction in Iterative Software Development Processes -- Incremental Versus Global Prediction Models
Estimation of development effort without imposing overhead on the project and the development team is of paramount importance for any software company. This study proposes a new e...
Pekka Abrahamsson, Raimund Moser, Witold Pedrycz, ...
SOSE
2008
IEEE
15 years 5 months ago
Precise Steps for Choreography Modeling for SOA Validation and Verification
Service-oriented architecture (SOA) enables organizations to transform their existing IT infrastructure into a more flexible business process platform.. In this architecture, deco...
Sebastian Wieczorek, Andreas Roth, Alin Stefanescu...
MICRO
2008
IEEE
208views Hardware» more  MICRO 2008»
15 years 5 months ago
Microarchitecture soft error vulnerability characterization and mitigation under 3D integration technology
— As semiconductor processing techniques continue to scale down, transient faults, also known as soft errors, are increasingly becoming a reliability threat to high-performance m...
Wangyuan Zhang, Tao Li