Sciweavers

5475 search results - page 175 / 1095
» Model Driven Security
Sort
View
152
Voted
KBSE
2007
IEEE
15 years 9 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
105
Voted
CNSR
2006
IEEE
107views Communications» more  CNSR 2006»
15 years 9 months ago
Modeling User Behaviors from FTP Server Logs
In this paper, a modeling toolkit is proposed for modeling user behavior from FTP server log files. This toolkit can develop analytical models from the data at hand with minimum a...
Yeming Hu, A. Nur Zincir-Heywood
IPSN
2009
Springer
15 years 10 months ago
Recovering temporal integrity with Data Driven Time Synchronization
Data Driven Time Synchronization (DDTS) provides synchronization across sensors by using underlying characteristics of data collected by an embedded sensing system. We apply the c...
Martin Lukac, Paul Davis, Robert Clayton, Deborah ...
SOFTVIS
2003
ACM
15 years 8 months ago
Visualizing Model Mappings in UML
Whenever multiple representations or models of a system exist, there is the possibility of defining how they relate. In model driven software development, it is essential that th...
Jan Hendrik Hausmann, Stuart Kent
PAAMS
2009
Springer
15 years 8 months ago
A Tool for Generating Model Transformations By-Example in Multi-Agent Systems
Abstract Many Multi-Agent Systems (MAS) methodologies incorporate a modeldriven approach. Model Driven Engineering is based on three main ideas: models are the “first-class citi...
Iván García-Magariño, Sylvain...