Sciweavers

2236 search results - page 279 / 448
» Secure Software Design in Practice
Sort
View
JUCS
2008
105views more  JUCS 2008»
14 years 10 months ago
Taxonomy for Integrating Models in the Development of Interactive Groupware Systems
: This paper describes the taxonomy for designing interactive groupware systems. The taxonomy defines the objectives, methods and principles for classifying models and facilitates ...
William J. Giraldo, Ana I. Molina, César A....
WOSP
2000
ACM
15 years 2 months ago
Quantitative system evaluation with DSPNexpress 2000
This paper describes the software package DSPNexpress 2000, a tool for the quantitative evaluation of systems specified in stochastic Petri nets, the Unified Modeling Language (UM...
Christoph Lindemann, Axel Thümmler, Alexander...
ISCAS
2003
IEEE
156views Hardware» more  ISCAS 2003»
15 years 3 months ago
GNOMES: a testbed for low power heterogeneous wireless sensor networks
Continuing trends in sensor, semiconductor and communication systems technology (smaller, faster, cheaper) make feasible very dense networks of fixed and mobile wireless devices ...
Erik Welsh, Walt Fish, J. Patrick Frantz
SIGSOFT
2005
ACM
15 years 10 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
OOPSLA
2007
Springer
15 years 4 months ago
No ifs, ands, or buts: uncovering the simplicity of conditionals
Schematic tables are a new representation for conditionals. Roughly a cross between decision tables and data flow graphs, they represent computation and decision-making orthogona...
Jonathan Edwards