Sciweavers

6253 search results - page 401 / 1251
» Use Case Modeling Guidelines
Sort
View
DAC
2007
ACM
16 years 5 months ago
Width-dependent Statistical Leakage Modeling for Random Dopant Induced Threshold Voltage Shift
Statistical behavior of device leakage and threshold voltage shows a strong width dependency under microscopic random dopant fluctuation. Leakage estimation using the conventional...
Jie Gu, Sachin S. Sapatnekar, Chris H. Kim
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 11 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
EMISA
2007
Springer
15 years 11 months ago
Viewpoint-based Meta Model Engineering
: Work systems are complex artifacts that address the concerns of a large and diverse group of stakeholders. These concerns must be reflected in the models which are created as use...
Stephan Kurpjuweit, Robert Winter
ITCC
2005
IEEE
15 years 10 months ago
A New Electronic Cash Model
- With the development of e-commerce, choosing a proper electronic payment method has become more and more important. Competing with other payment methods on the Internet, electron...
Xiaosong Hou, Chik How Tan
143
Voted
BIRTHDAY
2005
Springer
15 years 10 months ago
Synthesis Revisited: Generating Statechart Models from Scenario-Based Requirements
Constructing a program from a specification is a long-known general and fundamental problem. Besides its theoretical interest, this question also has practical implications, since...
David Harel, Hillel Kugler, Amir Pnueli