Sciweavers

1229 search results - page 150 / 246
» Graph-Based Design and Analysis of Dynamic Software Architec...
Sort
View
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
ECBS
1999
IEEE
138views Hardware» more  ECBS 1999»
15 years 8 months ago
Multi-Domain Surety Modeling and Analysis for High Assurance Systems
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
James Davis, Jason Scott, Janos Sztipanovits, Marc...
ECBS
1999
IEEE
171views Hardware» more  ECBS 1999»
15 years 8 months ago
Metamodeling - Rapid Design and Evolution of Domain-Specific Modeling Environments
Model integrated computing (MIC) is gaining increased attention as an effective and efficient method for developing, maintaining, and evolving large-scale, domain-specific softwar...
Greg Nordstrom, Janos Sztipanovits, Gabor Karsai, ...
ECRTS
2010
IEEE
15 years 5 months ago
Making DRAM Refresh Predictable
Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Sched...
Balasubramanya Bhat, Frank Mueller
PDP
2007
IEEE
15 years 10 months ago
HAND: Highly Available Dynamic Deployment Infrastructure for Globus Toolkit 4
—Grid computing is becoming more and more attractive for coordinating large-scale heterogeneous resource sharing and problem solving. Of particular interest for effective Grid co...
Li Qi, Hai Jin, Ian T. Foster, Jarek Gawor