Sciweavers

841 search results - page 140 / 169
» A secure architectural description language for agent system...
Sort
View
ACSAC
2002
IEEE
15 years 6 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
ICSE
2005
IEEE-ACM
16 years 2 months ago
Monitoring and control in scenario-based requirements analysis
Scenarios are an effective means for eliciting, validating and documenting requirements. At the requirements level, scenarios describe sequences of interactions between the softwa...
Emmanuel Letier, Jeff Kramer, Jeff Magee, Sebasti&...
AAAI
2012
13 years 4 months ago
Relative Attributes for Enhanced Human-Machine Communication
We propose to model relative attributes1 that capture the relationships between images and objects in terms of human-nameable visual properties. For example, the models can captur...
Devi Parikh, Adriana Kovashka, Amar Parkash, Krist...
UML
2000
Springer
15 years 5 months ago
On the Extension of UML with Use Case Maps Concepts
Descriptions of reactive systems focus heavily on behavioral aspects, often in terms of scenarios. To cope with the increasing complexity of services provided by these systems, beh...
Daniel Amyot, Gunter Mussbacher
OOPSLA
2000
Springer
15 years 5 months ago
Application isolation in the JavaTM Virtual Machine
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
Grzegorz Czajkowski