Sciweavers

1382 search results - page 120 / 277
» Strider: Configuration Modelling and Analysis of Complex Sys...
Sort
View
135
Voted
FASE
2008
Springer
15 years 5 hour ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
89
Voted
USS
2008
15 years 17 days ago
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST
The State of Ohio commissioned the EVEREST study in late summer of 2007. The study participants were charged with an analysis of the usability, stability, and security of all voti...
Kevin R. B. Butler, William Enck, Harri Hursti, St...
108
Voted
JCDL
2003
ACM
231views Education» more  JCDL 2003»
15 years 3 months ago
Acquisition, Representation, Query and Analysis of Spatial Data: A Demonstration 3D Digital Library
The increasing power of techniques to model complex geometry and extract meaning from 3D information create complex data that must be described, stored, and displayed to be useful...
Jeremy Rowe, Anshuman Razdan, Arleyn Simon
EMSOFT
2006
Springer
15 years 1 months ago
Incremental schedulability analysis of hierarchical real-time components
Embedded systems are complex as a whole but consist of smaller independent modules minimally interacting with each other. This structure makes embedded systems amenable to composi...
Arvind Easwaran, Insik Shin, Oleg Sokolsky, Insup ...
78
Voted
BTW
2007
Springer
119views Database» more  BTW 2007»
15 years 4 months ago
Change Management in Large Information Infrastructures - Representing and Analyzing Arbitrary Metadata
Abstract: With information infrastructures getting more and more complex, it becomes necessary to give automated support for managing the evolution of the infrastructure. If change...
Boris Stumm, Stefan Dessloch