Sciweavers

674 search results - page 54 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
CCE
2011
14 years 4 months ago
Development and validation of a dynamic model for regeneration of passivating baths using membrane contactors
Selective liquid membranes have been traditionally employed for liquid/liquid and gas/liquid mass transfer in a wide range of applications. In particular, the Emulsion Pertraction...
Eugenio Bringas, Rosa Mediavilla, Ana María...
CSFW
2012
IEEE
13 years 5 days ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
AGENTS
2001
Springer
15 years 2 months ago
A knowledge level software engineering methodology for agent oriented programming
Our goal in this paper is to introduce and motivatea methodology, called Tropos, for building agent oriented software systems. Tropos is based on two key ideas. First, the notion ...
Paolo Bresciani, Anna Perini, Paolo Giorgini, Faus...
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
15 years 4 months ago
A Visualization Framework for Task-Oriented Modeling Using UML
— The UML is a collection of 13 diagram notations to describe different views of a software system. The existing diagram types display model elements and their relations. Softwar...
Christian F. J. Lange, Martijn A. M. Wijns, Michel...
ICCAD
2000
IEEE
169views Hardware» more  ICCAD 2000»
15 years 2 months ago
Transistor-Level Timing Analysis Using Embedded Simulation
A high accuracy system for transistor-level static timing analysis is presented. Accurate static timing verification requires that individual gate and interconnect delays be accu...
Pawan Kulshreshtha, Robert Palermo, Mohammad Morta...