Sciweavers

22 search results - page 3 / 5
» Five Reasons for Scenario-based Design
Sort
View
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
14 years 6 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng
JBI
2006
117views Bioinformatics» more  JBI 2006»
13 years 6 months ago
Desiderata for domain reference ontologies in biomedicine
Domain reference ontologies represent knowledge about a particular part of the world in a way that is independent from specific objectives, through a theory of the domain. An exam...
Anita Burgun
ELECTRONICMARKETS
2010
124views more  ELECTRONICMARKETS 2010»
13 years 3 months ago
The difficulty of studying inter-organisational IS phenomena on large scales: critical reflections on a research journey
We argue that certain theoretical commitments that underpin much existing Interorganisational Information Systems (IOIS) research at small scales become untenable when IOIS are st...
Kai Reimers, Robert B. Johnston, Stefan Klein
NSPW
2004
ACM
13 years 11 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
INFOCOM
2010
IEEE
13 years 4 months ago
Measurement and Diagnosis of Address Misconfigured P2P Traffic
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and stu...
Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzma...