Sciweavers

683 search results - page 58 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
109
Voted
NOMS
2000
IEEE
176views Communications» more  NOMS 2000»
15 years 5 months ago
Design and analysis of a proactive application management system (PAMS)
Management of large-scale Network-Centric Systems (NCS) and their applications is an extremely complex and challenging task due to factors such as centralized management architect...
Salim Hariri, Yoonhee Kim
ER
1998
Springer
145views Database» more  ER 1998»
15 years 4 months ago
Design and Analysis of Quality Information for Data Warehouses
Data warehouses are complex systems that have to deliver highly-aggregated, high quality data from heterogeneous sources to decision makers. Due to the dynamic change in the requir...
Manfred A. Jeusfeld, Christoph Quix, Matthias Jark...
ICICS
2004
Springer
15 years 6 months ago
Automatic Covert Channel Analysis of a Multilevel Secure Component
Abstract. The NRL Pump protocol defines a multilevel secure component whose goal is to minimize leaks of information from high level systems to lower level systems, without degrad...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone...
97
Voted
ENTCS
2010
110views more  ENTCS 2010»
15 years 21 days ago
Modelling Interactive Experience, Function and Performance in Ubiquitous Systems
The cost of deploying a ubiquitous system to enhance a physical environment is likely to be considerable. The success of its deployment is highly dependent on its context: the phy...
Michael D. Harrison, Mieke Massink
TACAS
1998
Springer
131views Algorithms» more  TACAS 1998»
15 years 4 months ago
Detecting Races in Relay Ladder Logic Programs
Relay Ladder Logic (RLL) [4] is a programming language widely used for complex embedded control applications such as manufacturing and amusement park rides. The cost of bugs in RLL...
Alexander Aiken, Manuel Fähndrich, Zhendong S...