Sciweavers

3555 search results - page 567 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
15 years 10 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke
INFOCOM
2005
IEEE
15 years 9 months ago
The impact of imperfect scheduling on cross-layer rate control in wireless networks
— In this paper, we study cross-layer design for rate control in multihop wireless networks. In our previous work, we have developed an optimal cross-layered rate control scheme ...
Xiaojun Lin, Ness B. Shroff
OTM
2005
Springer
15 years 9 months ago
A Service-Oriented Workflow Language for Robust Interacting Applications
Abstract. In a service-oriented world, a long-running business process can be implemented as a set of stateful services that represent the individual but coordinated steps that mak...
Surya Nepal, Alan Fekete, Paul Greenfield, Julian ...
173
Voted
DSRT
2003
IEEE
15 years 9 months ago
Real Time Inspection of Hidden Worlds
“Smart Things” are commonly understood as wireless ad-hoc networked, mobile, autonomous, special purpose computing appliances, usually interacting with their environment impli...
Alois Ferscha, Markus Keller
ESEM
2007
ACM
15 years 5 months ago
Assessing, Comparing, and Combining Statechart- based testing and Structural testing: An Experiment
An important number of studies have addressed the importance of models in software engineering, mainly in the design of robust software systems. Although models have been proven t...
Samar Mouchawrab, Lionel C. Briand, Yvan Labiche