Sciweavers

3555 search results - page 76 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
HICSS
2002
IEEE
101views Biometrics» more  HICSS 2002»
15 years 6 months ago
Groupware Case Studies: Electronic Meeting Systems in the Work Place
This paper presents data collected from 5 real-world (federal, state and commercial) groups as they undertook their real-world (Business Process Reengineering (BPR) and Joint Appl...
Gail Corbitt, Ben Martz
AOSE
2004
Springer
15 years 6 months ago
A Framework for Patterns in Gaia: A Case-Study with Organisations
Abstract. The agent-oriented approach has been successfully applied to the solution of complex problems in dynamic open environments. However, to extend its use to mainstream compu...
Jorge Gonzalez-Palacios, Michael Luck
DAGSTUHL
2007
15 years 2 months ago
QUAD: Overview and Recent Developments
We give an outline of the specification and provable security features of the QUAD stream cipher proposed at Eurocrypt 2006 [6]. The cipher relies on the iteration of a multivaria...
David Arditti, Côme Berbain, Olivier Billet,...
SIAMMA
2010
49views more  SIAMMA 2010»
14 years 8 months ago
Nonlinear Degenerate Evolution Equations in Mixed Formulation
Abstract. We develop the theory of degenerate and nonlinear evolution systems in mixed formulation. It will be shown that many of the well-known results for the stationary problem ...
R. E. Showalter
ICIW
2008
IEEE
15 years 7 months ago
Evaluating the Use of AOP and MDA in Web Service Development
— Model-Driven Architecture (MDA) is introduced to shorten the software development time, produce better quality of code and promote the reuse of software artifacts. On the other...
Guadalupe Ortiz, Behzad Bordbar, Juan Herná...