Sciweavers

69 search results - page 12 / 14
» Enforcing Design Constraints with Object Logic
Sort
View
106
Voted
KBSE
2010
IEEE
14 years 10 months ago
Analyzing security architectures
We present a semi-automated approach, Secoria, for analyzing a security runtime architecture for security and for conformance to an object-oriented implementation. Typecheckable a...
Marwan Abi-Antoun, Jeffrey M. Barnes
110
Voted
VLSID
2008
IEEE
138views VLSI» more  VLSID 2008»
16 years 1 days ago
Memory Architecture Exploration Framework for Cache Based Embedded SOC
Today's feature-rich multimedia products require embedded system solution with complex System-on-Chip (SoC) to meet market expectations of high performance at a low cost and l...
T. S. Rajesh Kumar, C. P. Ravikumar, R. Govindaraj...
COMPSAC
2010
IEEE
14 years 9 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
TOSEM
2002
118views more  TOSEM 2002»
14 years 11 months ago
Modeling software architectures in the Unified Modeling Language
Abstract. The Unified Modeling Language (UML) is a family of design notations that is rapidly becoming a de facto standard software design language. UML provides a variety of usefu...
Nenad Medvidovic, David S. Rosenblum, David F. Red...
104
Voted
TOG
2008
100views more  TOG 2008»
14 years 11 months ago
Interactive procedural street modeling
This paper addresses the problem of interactively modeling large street networks. We introduce a modeling framework that uses tensor fields to guide the generation of a street gra...
Guoning Chen, Gregory Esch, Peter Wonka, Pascal M&...