Sciweavers

1221 search results - page 151 / 245
» Integrating Business and Software Development Models
Sort
View
127
Voted
ISCA
1999
IEEE
187views Hardware» more  ISCA 1999»
15 years 4 months ago
Area Efficient Architectures for Information Integrity in Cache Memories
Information integrity in cache memories is a fundamental requirement for dependable computing. Conventional architectures for enhancing cache reliability using check codes make it...
Seongwoo Kim, Arun K. Somani
ICDCS
1996
IEEE
15 years 4 months ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...
MODELLIERUNG
2001
15 years 2 months ago
Dependency Charts as a Means to Model Inter-Scenario Dependencies
: Scenarios/use cases have gained wide-spread use over the last couple of years. In software engineering they are mainly used to capture requirements and specify a system. Many sof...
Johannes Ryser, Martin Glinz
FASE
2004
Springer
15 years 6 months ago
Modeling Role-Based Access Control Using Parameterized UML Models
Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...
RE
2005
Springer
15 years 6 months ago
Model-Driven Visual Requirements Engineering
This paper describes the requirements handling process of a set of research projects, the ATHENA IP, and how this process is supported by modeling and visualizing requirement stru...
Helge Grenager Solheim, Frank M. Lillehagen, Sobah...