Sciweavers

2255 search results - page 344 / 451
» High Assurance Software Systems
Sort
View
CCS
2009
ACM
15 years 11 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
ICSE
2009
IEEE-ACM
15 years 11 months ago
Improving quality, one process change at a time
We report on one organization's experience making process changes in a suite of projects. The changes were motivated by clients’ requests for better time estimates, better ...
Caryna Pinheiro, Frank Maurer, Jonathan Sillito
ICSEA
2009
IEEE
15 years 11 months ago
Testing of Image Processing Algorithms on Synthetic Data
—In this paper, it is shown that synthetic images can be used to test specific use cases of a lane tracking algorithm which has been developed by Audi AG. This was achieved by s...
Kilian von Neumann-Cosel, Erwin Roth, Daniel Lehma...
EDOC
2008
IEEE
15 years 11 months ago
MDD4SOA: Model-Driven Service Orchestration
Service-Oriented Architectures (SOAs) have become an important cornerstone of the development of enterprise-scale software applications. Although a range of domain-specific langua...
Philip Mayer, Andreas Schroeder, Nora Koch
ISPASS
2008
IEEE
15 years 11 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai