Sciweavers

3555 search results - page 3 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ACMDIS
2000
ACM
15 years 1 months ago
Using a Technique from Graphic Designers to Develop Innovative System Designs
Rapid technological change requires that system designers explore potential design spaces widely before committing to a local design space in which to evolve a problem solution. W...
Catalina Danis, Stephen J. Boies
MABS
2004
Springer
15 years 2 months ago
Extending Time Management Support for Multi-agent Systems
Time management is essential when simulating multi-agent systems (MASs) as it allows consistent and repeatable simulation runs. So far, time management lacks support to express the...
Alexander Helleboogh, Tom Holvoet, Danny Weyns, Yo...
JNW
2006
142views more  JNW 2006»
14 years 9 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
QOSA
2007
Springer
15 years 3 months ago
Extending the Capabilities of Component Models for Embedded Systems
Component-based development helps to improve the modularity and reusability of embedded systems. Component models devised for embedded systems are typically restricted due to the l...
Ihor Kuz, Yan Liu
MR
2007
173views Robotics» more  MR 2007»
14 years 9 months ago
A maintenance planning and business case development model for the application of prognostics and health management (PHM) to ele
- This paper presents a model that enables the optimal interpretation of Prognostics and Health Management (PHM) results for electronic systems. In this context, optimal interpreta...
Peter A. Sandborn, Chris Wilkinson