Sciweavers

727 search results - page 132 / 146
» Automating the Choice of Decision Support System Architectur...
Sort
View
KBSE
2007
IEEE
15 years 3 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
DATE
2010
IEEE
169views Hardware» more  DATE 2010»
15 years 2 months ago
Design space exploration of a mesochronous link for cost-effective and flexible GALS NOCs
There is today little doubt on the fact that a high-performance and cost-effective Network-on-Chip can only be designed in 45nm and beyond under a relaxed synchronization assumpti...
Daniele Ludovici, Alessandro Strano, Georgi Nedelt...
CONTEXT
2001
Springer
15 years 1 months ago
A Connectionist-Symbolic Approach to Modeling Agent Behavior: Neural Networks Grouped by Contexts
A recent report by the National Research Council (NRC) declares neural networks “hold the most promise for providing powerful learning models”. While some researchers have expe...
Amy E. Henninger, Avelino J. Gonzalez, Michael Geo...
DEXA
1997
Springer
179views Database» more  DEXA 1997»
15 years 1 months ago
Linking Object-Oriented Conceptual Modeling with Object-Oriented Implementation in Java
Nowadays, if we want to obtain a sound and correct final software product it is very important to be able to properly join modern OO programming environments, which are built for ...
Oscar Pastor, Emilio Insfrán, Vicente Pelec...
HPDC
2010
IEEE
14 years 10 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik