Sciweavers

3555 search results - page 17 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
IPCCC
2006
IEEE
15 years 7 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
SEKE
2007
Springer
15 years 7 months ago
REM4j - A Framework for Measuring the Reverse Engineering Capability of UML CASE Tools
Reverse Engineering is becoming increasingly important in the software development world today as many organizations are battling to understand and maintain old legacy systems. To...
Steven Kearney, James F. Power
UML
2005
Springer
15 years 6 months ago
Simplifying Autonomic Enterprise Java Bean Applications Via Model-Driven Development: A Case Study
Autonomic computer systems aim to reduce the configuration, operational, and maintenance costs of distributed applications by enabling them to self-manage, self-heal, self-optimiz...
Jules White, Douglas C. Schmidt, Aniruddha S. Gokh...
LREC
2008
111views Education» more  LREC 2008»
15 years 2 months ago
Low-Density Language Bootstrapping: the Case of Tajiki Persian
Low-density languages raise difficulties for standard approaches to natural language processing that depend on large online corpora. Using Persian as a case study, we propose a no...
Karine Megerdoomian, Dan Parvaz
CDC
2009
IEEE
173views Control Systems» more  CDC 2009»
15 years 5 months ago
Virtual holonomic constraint approach for planar bipedal walking robots extended to double support
The concept of virtual holonomic constraints is extended to the case of double support, which is characterized by a closed kinematic chain and redundancy in the state variables. An...
Michael Scheint, Marion Sobotka, Martin Buss