Sciweavers

409 search results - page 46 / 82
» How to Design Practical Test Cases
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 6 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
DAC
2002
ACM
16 years 23 days ago
A factorization-based framework for passivity-preserving model reduction of RLC systems
We present a framework for passivity-preserving model reduction for RLC systems that includes, as a special case, the well-known PRIMA model reduction algorithm. This framework pr...
Q. Su, Venkataramanan Balakrishnan, Cheng-Kok Koh
DANCE
2002
IEEE
15 years 4 months ago
Maude as a Wide-Spectrum Framework for Formal Modeling and Analysis of Active Networks
Modeling and formally analyzing active network systems and protocols is quite challenging, due to their highly dynamic nature and the need for new network models. We propose a wid...
José Meseguer, Peter Csaba Ölveczky, M...
DAC
1993
ACM
15 years 3 months ago
Spectral Transforms for Large Boolean Functions with Applications to Technology Mapping
The Walsh transform has numerous applications in computer-aided design, but the usefulness of these techniques in practice has been limited by the size of the boolean functions th...
Edmund M. Clarke, Kenneth L. McMillan, Xudong Zhao...
WSC
2007
15 years 2 months ago
Predicting the impact on business performance of enhanced information system using business process simulation
The estimation of the impact on performance in business process (BP) by introducing an information system (IS) is an important practical problem in investment appraisal. This pape...
Yifei Tan, Soemon Takakuwa