Sciweavers

674 search results - page 17 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
ESORICS
2005
Springer
15 years 3 months ago
Browser Model for Security Analysis of Browser-Based Protocols
Currently, many industrial initiatives focus on web-based applications. In this context an important requirement is that the user should only rely on a standard web browser. Hence...
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sa...
SEKE
2004
Springer
15 years 3 months ago
UCDA: Use Case Driven Development Assistant Tool for Class Model Generation
The development of class models using the Rational Unified Process (RUP) requires complete, correct and unambiguous use case specification documents. The Use Case Driven Developmen...
Kalaivani Subramaniam, Dong Liu, Behrouz Homayoun ...
88
Voted
IPPS
2006
IEEE
15 years 3 months ago
Performance analysis of stochastic process algebra models using stochastic simulation
We present a translation of a generic stochastic process algebra model into a form suitable for stochastic simulation. By systematically generating rate equations from a process d...
Jeremy T. Bradley, Stephen T. Gilmore, Nigel Thoma...
CASES
2006
ACM
15 years 3 months ago
Methods for power optimization in distributed embedded systems with real-time requirements
Dynamic voltage scaling and sleep state control have been shown to be extremely effective in reducing energy consumption in CMOS circuits. Though plenty of research papers have st...
Razvan Racu, Arne Hamann, Rolf Ernst, Bren Mochock...
WSC
2000
14 years 11 months ago
Using simulation for manufacturing process reengineering: a practical case study
This paper presents a simulation study carried out to solve a problem of manufacturing process reengineering. The specific company in which the study took place is a medium size m...
Lisete Silva, Ana Luisa Ramos, Pedro M. Vilarinho