Sciweavers

1304 search results - page 105 / 261
» Model-Driven Engineering for Requirements Analysis
Sort
View
IAT
2010
IEEE
14 years 8 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
ICDCSW
2005
IEEE
15 years 3 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
ECIR
2003
Springer
14 years 11 months ago
Improving the Evaluation of Web Search Systems
Linkage analysis as an aid to web search has been assumed to be of significant benefit and we know that it is being implemented by many major Search Engines. Why then have few TREC...
Cathal Gurrin, Alan F. Smeaton
ITNG
2008
IEEE
15 years 4 months ago
Prototype Generation from Ontology Charts
Semantic Analysis is a business analysis method designed to capture user requirements and represent them as text or in a graph that is called Ontology Chart. Ontology Charts can b...
George Tsaramirsis, Iman Poernomo
ICCAD
2005
IEEE
110views Hardware» more  ICCAD 2005»
15 years 7 months ago
Performance analysis of carbon nanotube interconnects for VLSI applications
The work in this paper analyses the applicability of carbon nanotube (CNT) bundles as interconnects for VLSI circuits, while taking into account the practical limitations in this ...
Navin Srivastava, Kaustav Banerjee