Sciweavers

1213 search results - page 80 / 243
» Traceability for System Families
Sort
View
CCS
2003
ACM
15 years 5 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
AIEDAM
2008
114views more  AIEDAM 2008»
15 years 1 days ago
Design rationale: Researching under uncertainty
Rationale research in software development is a challenging area because while there is no shortage of advocates for its value, there is also no shortage of reasons for why rationa...
Janet E. Burge
JOT
2008
445views more  JOT 2008»
14 years 12 months ago
From The Business Motivation Model (BMM) To Service Oriented Architecture (SOA)
The purpose of this article is to provide a brief insight about how to link your business vision, goals, strategies, tactics as well as business rules according to BMM, then bridg...
Birol Berkem
IJMSO
2007
109views more  IJMSO 2007»
14 years 11 months ago
MOQ: Web services ontologies for QoS and general quality evaluations
When describing Web services, one of the obvious aspects that needs representing is Quality of Service” (QoS), the capability of a Web service to meet an acceptable level of ser...
Henry M. Kim, Arijit Sengupta, Joerg Evermann
JOOP
1998
98views more  JOOP 1998»
14 years 11 months ago
Design Patterns as Language Constructs
Design patterns have proven to be very useful for the design of object-oriented systems. The power of design patterns stems from their ability to provide generic solutions to reap...
Jan Bosch