Sciweavers

9316 search results - page 47 / 1864
» Analysis of traceback techniques
Sort
View
CSFW
2010
IEEE
15 years 3 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
HYBRID
2000
Springer
15 years 3 months ago
Ellipsoidal Techniques for Reachability Analysis
For the reach tube of a linear time-varying system with ellipsoidal bounds on the control variable consider the following approximation problem. Find a tight ellipsoid-valued tube...
Alexander B. Kurzhanski, Pravin Varaiya
EURODAC
1994
IEEE
110views VHDL» more  EURODAC 1994»
15 years 3 months ago
An experimental analysis of the effectiveness of the circular self-test path technique
Paolo Prinetto, Fulvio Corno, Matteo Sonza Reorda
IUSED
2008
15 years 1 months ago
Enriching Requirements Analysis with the Personas Technique
John W. Castro, Silvia Teresita Acuña, Nata...