Sciweavers

141 search results - page 8 / 29
» Application of Vulnerability Discovery Models to Major Opera...
Sort
View
ICSE
2004
IEEE-ACM
15 years 9 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
HOTOS
2003
IEEE
15 years 2 months ago
Development Tools for Distributed Applications
The emergence of the global Internet has dramatically broadened and changed the computing landscape. In particular, much of the value in contemporary computing systems derives fro...
Mukesh Agrawal, Srinivasan Seshan
HOTOS
1999
IEEE
15 years 1 months ago
The Case for Higher-Level Power Management
Reducing the energy consumed in the use of computing devices is becoming a major design challenge. While the problem obviously must be addressed with improved low-level technology...
Carla Schlatter Ellis
110
Voted
ESEC
1997
Springer
15 years 1 months ago
Developing Multimedia Applications with the WinWin Spiral Model
Fifteen teams recently used the WinWin Spiral Model to perform the system engineering and architecting of a set of multimedia applications for the USC Library Information Systems....
Barry W. Boehm, Alexander Egyed, Julie Kwan, Raymo...
DOOD
1995
Springer
102views Database» more  DOOD 1995»
15 years 1 months ago
Active Database Rules with Transaction-Conscious Stable-Model Semantics
Semantics represents a major problem area for active databases inasmuch as (i) there is l framework for defining the abstract semantics of active rules, and (ii) the various syst...
Carlo Zaniolo