Sciweavers

652 search results - page 45 / 131
» Deriving Specifications of Dependable Systems: toward a Meth...
Sort
View
ICDAR
2011
IEEE
13 years 9 months ago
Towards Searchable Digital Urdu Libraries - A Word Spotting Based Retrieval Approach
—Libraries in South Asia hold huge collections of valuable printed documents in Urdu and it is of interest to digitize these collections to make them more accessible. The unavail...
Ali Abidi, Imran Siddiqi, Khurram Khurshid
ICISS
2007
Springer
15 years 4 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
15 years 2 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...
ISSRE
2000
IEEE
15 years 2 months ago
Evaluation of Regressive Methods for Automated Generation of Test Trajectories
Automated generation of test cases is a prerequisite for fast testing. Whereas the research has addressed the creation of individual test points, test trajectoiy generation has at...
Brian J. Taylor, Bojan Cukic
EXPCS
2007
15 years 2 months ago
Towards user-centric metrics for denial-of-service measurement
To date, the measurement of user-perceived degradation of quality of service during denial of service (DoS) attacks remained an elusive goal. Current approaches mostly rely on low...
Jelena Mirkovic, Alefiya Hussain, Brett Wilson, So...