Sciweavers

1304 search results - page 161 / 261
» Model-Driven Engineering for Requirements Analysis
Sort
View
138
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
ICSM
2008
IEEE
15 years 10 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos
131
Voted
ISCAS
2006
IEEE
146views Hardware» more  ISCAS 2006»
15 years 10 months ago
XML-based customization along the scalability axes of H.264/AVC scalable video coding
Abstract— The heterogeneity in the current and future multimedia environment requires an elegant adaptation framework for the production and consumption of different kinds of mul...
Davy De Schrijver, Wesley De Neve, Koen De Wolf, S...
RE
2005
Springer
15 years 9 months ago
An Algebraic Framework for Merging Incomplete and Inconsistent Views
View merging, also called view integration, is a key problem in conceptual modeling. Large models are often constructed and accessed by manipulating individual views, but it is im...
Mehrdad Sabetzadeh, Steve M. Easterbrook
COMPSAC
2002
IEEE
15 years 9 months ago
Resource Instantiation Policies for Software Process Environments
Process-Centered Software Engineering Environments (PSEEs) deal with activities that demand limited resources. Characteristics about required resources and their dynamic availabili...
Carla Alessandra Lima Reis, Rodrigo Quites Reis, H...