Sciweavers

1522 search results - page 145 / 305
» Practical Exception Specifications
Sort
View
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 8 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
ETFA
2008
IEEE
15 years 8 months ago
A secure agent platform for active RFID
RFID are used to identify products in factory automation applications; Multi agent systems are a possibility to introduce flexibility into production processes. This article intro...
Albert Treytl, Werner Spenger, Bilal Riaz
GLOBECOM
2008
IEEE
15 years 8 months ago
Scalable and Adaptive Resource Scheduling in IEEE 802.16 WiMAX Networks
—This paper proposes the so-called adaptive resource scheduling (ARS) schemes to cope with both uplink and downlink traffic transmissions in WiMAX, in order to fully utilize the ...
Hanwu Wang, Weijia Jia
HICSS
2008
IEEE
236views Biometrics» more  HICSS 2008»
15 years 8 months ago
A Case Study: Introducing eXtreme Programming in a US Government System Development Project
The US Military’s ability to meet its mission critical requirements calls for increased agility in its information technology development process. The purpose of this case study...
Ann L. Fruhling, Patrick McDonald, Christopher Dun...
ISORC
2008
IEEE
15 years 8 months ago
A Hierarchical Resource Management Scheme Enabled by the TMO Programming Scheme
Abstract: For cost-effective realization of sizable realtime distributed computing application systems, significant advances in resource allocation are in critical needs. An advanc...
K. H. (Kane) Kim, Yuqing Li, Kee-Wook Rim, Eltefaa...