Sciweavers

1366 search results - page 127 / 274
» Modularizing Contexted Constraints
Sort
View
TSE
2008
107views more  TSE 2008»
14 years 11 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
DATE
2009
IEEE
139views Hardware» more  DATE 2009»
15 years 6 months ago
Reliable mode changes in real-time systems with fixed priority or EDF scheduling
Abstract—Many application domains require adaptive realtime embedded systems that can change their functionality over time. In such systems it is not only necessary to guarantee ...
Nikolay Stoimenov, Simon Perathoner, Lothar Thiele
HICSS
2008
IEEE
128views Biometrics» more  HICSS 2008»
15 years 6 months ago
Service Composition Language to Unify Simulation and Optimization of Supply Chains
Proposed and developed is the language Service Composition (SC) CoJava, which extends the programming language Java with (1) a modular service composition framework; (2) an extens...
Alexander Brodsky, Malak Al-Nory, Hadon Nash
ICDM
2008
IEEE
136views Data Mining» more  ICDM 2008»
15 years 6 months ago
Generalized Framework for Syntax-Based Relation Mining
Supervised approaches to Data Mining are particularly appealing as they allow for the extraction of complex relations from data objects. In order to facilitate their application i...
Bonaventura Coppola, Alessandro Moschitti, Daniele...
FROCOS
2007
Springer
15 years 5 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...