Sciweavers

474 search results - page 31 / 95
» Assurance Based Development of Critical Systems
Sort
View
IJWET
2007
99views more  IJWET 2007»
15 years 5 months ago
An empirical approach to evaluating web application compliance across diverse client platform configurations
: Web applications are the most widely used class of software today. Increased diversity of web-client platform configurations causes execution of web applications to vary unpredic...
Cyntrica Eaton, Atif M. Memon
AOSE
2006
Springer
15 years 8 months ago
Using Risk Analysis to Evaluate Design Alternatives
Recently, multi-agent systems have proved to be a suitable approach to the development of real-life information systems. In particular, they are used in the domain of safety critic...
Yudistira Asnar, Volha Bryl, Paolo Giorgini
CRITIS
2007
15 years 6 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
15 years 6 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
EP
1998
Springer
15 years 9 months ago
Memory Scalability in Constraint-Based Multimedia Style Sheet Systems
Abstract. Multimedia style sheet systems uniformly use a constraintbased model of layout. Constraints provide a uniform mechanism for all aspects of style management and layout and...
Terry Cumaranatunge, Ethan V. Munson