Sciweavers

1114 search results - page 187 / 223
» Conceptual Content Management for Software Engineering Proce...
Sort
View
AOSD
2004
ACM
15 years 10 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
ISPASS
2003
IEEE
15 years 9 months ago
An MPEG-4 performance study for non-SIMD, general purpose architectures
MPEG-4 is an important international standard with wide applicability. This paper focuses on MPEG-4’s main profile, video, whose approach allows more efficiency in coding and ...
Sally A. McKee, Zhen Fang, Mateo Valero
AUIC
2000
IEEE
15 years 9 months ago
Supporting Special-Purpose Health Care Models via Web Interfaces
The potential of the Web, via both the Internet and intranets, to facilitate development of clinical information systems has been evident for some time. Most Web-based clinical wo...
James R. Warren, Heath K. Frankel, Joseph T. Noone...
COMPSAC
2007
IEEE
15 years 8 months ago
AOP-based automated unit test classification of large benchmarks
Despite the availability of a variety of program analysis tools, evaluation of these tools is difficult, as only few benchmark suites exist. Existing benchmark suites lack the uni...
Cyrille Artho, Zhongwei Chen, Shinichi Honiden
COMPSAC
2007
IEEE
15 years 8 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie