Sciweavers

2615 search results - page 250 / 523
» Analysis of Real Time Operating System Based Applications
Sort
View
ICSE
2004
IEEE-ACM
16 years 3 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
HICSS
2003
IEEE
132views Biometrics» more  HICSS 2003»
15 years 9 months ago
Markets for Reliability and Financial Options in Electricity: Theory to Support the Practice
The underlying structure of why and how consumers value reliability of electric service is explored, together with the technological options and cost characteristics for the provi...
Timothy Mount, William Schulze, Richard E. Schuler
LISA
2007
15 years 6 months ago
NetADHICT: A Tool for Understanding Network Traffic
Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insuffi...
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, An...
OSDI
2008
ACM
16 years 4 months ago
Carnegie Mellon's CyDAT: Harnessing a Wide Array of Telemetry Data to Enhance Distributed System Diagnostics
The number and complexity of distributed applications has exploded, and to-date, each has had to create its own method for providing diagnostic tools and performance metrics. Thes...
Chas DiFatta, Mark Poepping, Daniel V. Klein
USS
2010
15 years 1 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...