Sciweavers

176 search results - page 15 / 36
» SMART: System Model Acquisition from Requirements Text
Sort
View
ICAIL
2007
ACM
15 years 3 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
SIGMOD
1995
ACM
80views Database» more  SIGMOD 1995»
15 years 3 months ago
Join Queries with External Text Sources: Execution and Optimization Techniques
Text is a pervasive information type, and many applications require querying over text sources in addition to structured data. This paper studies the problem of query processing i...
Surajit Chaudhuri, Umeshwar Dayal, Tak W. Yan
ISORC
1999
IEEE
15 years 4 months ago
Implementing the Real-Time Publisher/Subscriber Model on the Controller Area Network (CAN)
Designing distributed real-time systems as being composed of communicating objects offers many advantages with respect to modularity and extensibility of these systems. However, d...
Jörg Kaiser, Michael Mock
HICSS
2008
IEEE
102views Biometrics» more  HICSS 2008»
15 years 6 months ago
Retrofitting Cyber Physical Systems for Survivability through External Coordination
Most Supervisory Control and Data Acquisition (SCADA) systems have been in operation for decades and they in general have 24x7 availability requirement, hence upgrading or adding ...
Kun Xiao, Shangping Ren, Kevin A. Kwiat
JUCS
2010
150views more  JUCS 2010»
14 years 10 months ago
Situation-Aware Community Computing Model for Developing Dynamic Ubiquitous Computing Systems
: For many complex and dynamic ubiquitous services, context-aware cooperation can be a solution. However, the way is not yet clear to make individual objects cooperate with each ot...
Youna Jung, Minsoo Kim