Sciweavers

2118 search results - page 98 / 424
» Execution of A Requirement Model in Software Development
Sort
View
APSEC
2003
IEEE
15 years 10 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
PPPJ
2004
ACM
15 years 10 months ago
Embedding JAAS in agent roles to apply local security policies
Agents are an emerging technology that grants programmers a new way to exploit distributed resources. Roles are a powerful concept that can be used to model agent interactions, all...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
AADEBUG
1997
Springer
15 years 8 months ago
Observation and Control for Debugging Distributed Computations
I present a general framework for observing and controlling a distributed computation and its applications to distributed debugging. Algorithms for observation are useful in distr...
Vijay K. Garg
SEE
1997
Springer
15 years 8 months ago
An environment for object-oriented real-time systems design
A concise object-oriented method for the development of real-time systems has been composed. Hardware components are modelled by (sofnuare) base objects; base objects are controll...
Rob L. W. van de Weg, Rolf Engmann, Raoul van de H...
WWW
2005
ACM
16 years 5 months ago
Executing incoherency bounded continuous queries at web data aggregators
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Ashish Puri, Krithi Ramamritham