Sciweavers

9316 search results - page 47 / 1864
» Analysis of traceback techniques
Sort
View
CSFW
2010
IEEE
15 years 1 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
HYBRID
2000
Springer
15 years 1 months ago
Ellipsoidal Techniques for Reachability Analysis
For the reach tube of a linear time-varying system with ellipsoidal bounds on the control variable consider the following approximation problem. Find a tight ellipsoid-valued tube...
Alexander B. Kurzhanski, Pravin Varaiya
EURODAC
1994
IEEE
110views VHDL» more  EURODAC 1994»
15 years 1 months ago
An experimental analysis of the effectiveness of the circular self-test path technique
Paolo Prinetto, Fulvio Corno, Matteo Sonza Reorda
IUSED
2008
14 years 11 months ago
Enriching Requirements Analysis with the Personas Technique
John W. Castro, Silvia Teresita Acuña, Nata...