Sciweavers

3555 search results - page 168 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CSFW
2010
IEEE
15 years 7 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
TOPNOC
2010
14 years 10 months ago
Schedule-Aware Workflow Management Systems
Abstract. Contemporary workflow management systems offer workitems to users through specific work-lists. Users select the work-items they will perform without having a specific sch...
Ronny Mans, Nick C. Russell, Wil M. P. van der Aal...
MCS
2008
Springer
15 years 3 months ago
On the stability analysis of nonlinear systems using polynomial Lyapunov functions
In the stability study of nonlinear systems, not to found feasible solution for the LMI problem associated with a quadratic Lyapunov function shows that it doesn't exist posi...
Hajer Bouzaouache, Naceur Benhadj Braiek
RV
2010
Springer
220views Hardware» more  RV 2010»
15 years 1 months ago
Runtime Verification with the RV System
The RV system is the first system to merge the benefits of Runtime Monitoring with Predictive Analysis. The Runtime Monitoring portion of RV is based on the successful Monitoring O...
Patrick O'Neil Meredith, Grigore Rosu
DSD
2005
IEEE
75views Hardware» more  DSD 2005»
15 years 9 months ago
An Educational Environment for Digital Testing: Hardware, Tools, and Web-Based Runtime Platform
We describe a new e-learning environment and a runtime platform for educational tools on digital system testing and design for testability. This environment is being developed in ...
Artur Jutman, Jaan Raik, Raimund Ubar, V. Vislogub...