Sciweavers

212 search results - page 34 / 43
» Risk Assessment and Integrity in System Design
Sort
View
IWSM
2007
Springer
15 years 3 months ago
Non-Functional Requirements Size Measurement Method (NFSM) with COSMIC-FFP
Abstract. Non-functional requirements (NFRs) of software systems are an important source of uncertainty in effort estimation. Furthermore, quantitatively approaching NFR early in a...
Mohamad Kassab, Olga Ormandjieva, Maya Daneva, Ala...
86
Voted
SACMAT
2005
ACM
15 years 3 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...
GECCO
2005
Springer
142views Optimization» more  GECCO 2005»
15 years 3 months ago
Toward evolved flight
We present the first hardware-in-the-loop evolutionary optimization on an ornithopter. Our experiments demonstrate the feasibility of evolving flight through genetic algorithms an...
Rusty Hunt, Gregory Hornby, Jason D. Lohn
80
Voted
ACSAC
2000
IEEE
15 years 1 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
FLAIRS
2003
14 years 11 months ago
Decision Evaluation of Three Flood Management Strategies
This article describes the application of computational decision analytic techniques for a national policy decision. It constitutes an example of the increasing use of modern comp...
Mats Danielson, Love Ekenberg, Jim Johansson