Sciweavers

674 search results - page 63 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
ADVAI
2010
110views more  ADVAI 2010»
14 years 8 months ago
Using Genetic Algorithms to Represent Higher-Level Planning in Simulation Models of Conflict
The focus of warfare has shifted from the Industrial Age to the Information Age, as encapsulated by the term Network Enabled Capability. This emphasises information sharing, comma...
James Moffat, Susan Fellows
EURODAC
1994
IEEE
138views VHDL» more  EURODAC 1994»
15 years 6 months ago
A VHDL-based bus model for multi-PCB system design
In the development of bus-based systems and individual PCB boards interfacing to a bus, the simulation usually requires a specific test bench or creation of quite complex stimuli....
Jari Toivanen, Jari Honkola, Jari Nurmi, Jyrki Tuo...
CBMS
2008
IEEE
15 years 8 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
WSC
2000
15 years 3 months ago
Product-mix analysis with Discrete Event Simulation
Discrete Event Simulation (DES) has been used as a design and validation tool in various production and business applications. DES can also be utilized for analyzing the product-m...
Raid Al-Aomar
ISIM
2007
15 years 3 months ago
Formal Computation Independent Model of the Problem Domain within the MDA
The proposed approach called Topological Functioning Modeling for Model Driven Architecture (TFMfMDA) uses formal mathematical foundations of Topological Functioning Model. It intr...
Janis Osis, Erika Asnina, Andrejs Grave