Sciweavers

212 search results - page 15 / 43
» Risk Assessment and Integrity in System Design
Sort
View
IFIP
2001
Springer
15 years 4 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
STEP
2005
IEEE
15 years 5 months ago
Tool Support for Continuous Quality Assessment
Maintenance costs make up the bulk of the total life cycle costs of a software system. Besides organizational issues such as knowledge management and turnover, the longterm mainte...
Florian Deissenboeck, Markus Pizka, Tilman Seifert
ENTCS
2008
95views more  ENTCS 2008»
14 years 11 months ago
A Rule-based Method to Match Software Patterns Against UML Models
In a UML model, different aspects of a system are covered by different types of diagrams and this bears the risk that an overall system specification becomes barely tractable by t...
Demis Ballis, Andrea Baruzzo, Marco Comini
ACMDIS
2006
ACM
15 years 5 months ago
How bodies matter: five themes for interaction design
Our physical bodies play a central role in shaping human experience in the world, understanding of the world, and interactions in the world. This paper draws on theories of embodi...
Scott R. Klemmer, Björn Hartmann, Leila Takay...
IROS
2006
IEEE
111views Robotics» more  IROS 2006»
15 years 5 months ago
A Delay-tolerant, Potential field-based, Network Implementation of an Integrated Navigation System
Abstract—Network controllers (NCs) are devices that are capable of converting dynamic, spatially extended, and functionally specialized modules into a taskable goal-oriented grou...
Rachana Ashok Gupta, Ahmad A. Masoud, Mo-Yuen Chow