Sciweavers

1521 search results - page 57 / 305
» Role analysis
Sort
View
ACISP
2005
Springer
15 years 5 months ago
Analysis of the HIP Base Exchange Protocol
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov
71
Voted
RE
2005
Springer
15 years 4 months ago
Quality Analysis of NL Requirements: An Industrial Case Study
Nowadays common practice indicates that the Requirement Engineering (RE) process critically influences the success of the system development life cycle. Several commercial tools ...
Antonio Bucchiarone, Stefania Gnesi, P. Pierini
CIKM
2004
Springer
15 years 4 months ago
Framework and algorithms for trend analysis in massive temporal data sets
Mining massive temporal data streams for significant trends, emerging buzz, and unusually high or low activity is an important problem with several commercial applications. In th...
Sreenivas Gollapudi, D. Sivakumar
ITRUST
2004
Springer
15 years 4 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
CAISE
2003
Springer
15 years 4 months ago
Virtual Communities: Analysis and Design Support
Abstract. Information systems engineering for design or knowledge communities is characterized by the fact that these communities constantly monitor themselves and initiate repair ...
Ralf Klamma, Marc Spaniol, Matthias Jarke