Sciweavers

276 search results - page 24 / 56
» Security in Context: Analysis and Refinement of Software Arc...
Sort
View
OOPSLA
1998
Springer
15 years 5 months ago
Visualizing Dynamic Software System Information Through High-Level Models
Dynamic information collected as a software system executes can help software engineers perform some tasks on a system more effectively. To interpret the sizable amount of data ge...
Robert J. Walker, Gail C. Murphy, Bjørn N. ...
ASPDAC
2007
ACM
108views Hardware» more  ASPDAC 2007»
15 years 5 months ago
Software Performance Estimation in MPSoC Design
- Estimation tools are a key component of system-level methodologies, enabling a fast design space exploration. Estimation of software performance is essential in current software-...
Márcio Oyamada, Flávio Rech Wagner, ...
KBSE
2007
IEEE
15 years 7 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
HIPEAC
2005
Springer
15 years 7 months ago
Dynamic Evolution of Congestion Trees: Analysis and Impact on Switch Architecture
Abstract. Designers of large parallel computers and clusters are becoming increasingly concerned with the cost and power consumption of the interconnection network. A simple way to...
Pedro Javier García, Jose Flich, José...
HICSS
2008
IEEE
164views Biometrics» more  HICSS 2008»
15 years 8 months ago
Scaling Consensus: Increasing Decentralization in Wikipedia Governance
How does “self-governance” happen in Wikipedia? Through in-depth interviews with eleven individuals who have held a variety of responsibilities in the English Wikipedia, we ob...
Andrea Forte, Amy Bruckman