Sciweavers

6978 search results - page 101 / 1396
» Reframing Requirements Analysis
Sort
View
SASO
2007
IEEE
15 years 4 months ago
Adaptive SSL: Design, Implementation and Overhead Analysis
Adaptive security is based on the observation that the security requirements of a system or service heavily depend on the environment in which they operate and should therefore be...
Christiaan J. Lamprecht, Aad P. A. van Moorsel
ADAEUROPE
2006
Springer
15 years 3 months ago
Bauhaus - A Tool Suite for Program Analysis and Reverse Engineering
The maintenance and evolution of critical software with high requirements for reliability is an extremely demanding, time consuming and expensive task. Errors introduced by ad-hoc ...
Aoun Raza, Gunther Vogel, Erhard Plödereder
WSC
2007
15 years 6 days ago
Automating DES output analysis: how many replications to run
This paper describes the selection and automation of a method for estimating how many replications should be run to achieve a required accuracy in the output. The motivation is to...
Kathryn Hoad, Stewart Robinson, Ruth Davies
WSC
1998
14 years 11 months ago
Analysis of Conveyor Systems within Automotive Final Assembly
This study describes an application of discrete-process simulation to a final assembly process within the automotive industry. The study addressed the issues of whether the proces...
Edward J. Williams, Haldun Çelik
COMCOM
2000
143views more  COMCOM 2000»
14 years 9 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou