Sciweavers

619 search results - page 50 / 124
» IFIP
Sort
View
IFIP
1994
Springer
15 years 3 months ago
Hidden Safety Requirements in Large-Scale Systems
To avoid hidden safety problems in future large scale systems, we must be able to identify the crucial assumptions underlying the development of their components and to enunciate ...
Carl E. Landwehr
IFIP
1994
Springer
15 years 3 months ago
The Professional Responsibilities of Software Engineers
Registered Engineers are expected to be aware of their responsibilities as professionals. Those who practice Software Engineering often enter that profession without either an eng...
David Lorge Parnas
IFIP
1992
Springer
15 years 3 months ago
Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?
On initiative of the Commission of the European Communities, the Information Technology Security Evaluation Criteria (ITSEC) are designed to provide a yardstick for the evaluation...
Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg
IFIP
1997
Springer
15 years 3 months ago
Waiting time distributions in a two-queue model with mixed exhaustive and gated-type K-limited services
We deal with a two-queue model with mixed exhaustive and gated-type K-limited services. This model can achieve various degrees of priority in each queue by varying the value of K....
Toshihisa Ozawa
CG
2008
Springer
15 years 1 months ago
Probing the 4-3-2 Edge Template in Hex
For the game of Hex, we find conditions under which moves into a 4-3-2 edge template are provably inferior. H.J. van den Herik et al. (Eds.): CG 2008, LNCS 5131, pp. 229-240, 2008....
Philip Henderson, Ryan B. Hayward