Sciweavers

185 search results - page 15 / 37
» Policies of System Level Pipeline Modeling
Sort
View
EOR
2011
124views more  EOR 2011»
14 years 4 months ago
Analysis of order-up-to-level inventory systems with compound Poisson demand
: We analyse a single echelon single item inventory system where the demand and the lead time are stochastic. Demand is modelled as a compound Poisson process and the stock is cont...
M. Zied Babai, Zied Jemaï, Yves Dallery
FLAIRS
2000
14 years 10 months ago
The Use of Formal Methods for Trusted Digital Signature Devices
This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Bruno Langenstein, Roland Vogt, Markus Ullmann
APSEC
2003
IEEE
15 years 2 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
RTS
2010
175views more  RTS 2010»
14 years 4 months ago
Schedulability and sensitivity analysis of multiple criticality tasks with fixed-priorities
Safety-critical real-time standards define several criticality levels for the tasks (e.g., DO-178B - Software Considerations in Airborne Systems and Equipment Certification). Clas...
François Dorin, Pascal Richard, Michaë...
ATAL
2005
Springer
15 years 3 months ago
Voting policies that cope with unreliable agents
Collaboration plays a critical role when a team is striving for goals that are difficult to achieve by an individual. In previous work, we defined the ETAPP (Environment-TaskAgen...
Christian Guttmann, Ingrid Zukerman