Sciweavers

95 search results - page 13 / 19
» A Case Study in Eliciting Scalability Requirements
Sort
View
COMPSAC
2010
IEEE
13 years 4 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
IMC
2005
ACM
14 years 27 days ago
Exploiting Internet Route Sharing for Large Scale Available Bandwidth Estimation
Recent progress in active measurement techniques has made it possible to estimate end-to-end path available bandwidth. However, how to efficiently obtain available bandwidth info...
Ningning Hu, Peter Steenkiste
SIPS
2007
IEEE
14 years 1 months ago
Design and Analysis of LDPC Decoders for Software Defined Radio
Low Density Parity Check (LDPC) codes are one of the most promising error correction codes that are being adopted by many wireless standards. This paper presents a case study for ...
Sangwon Seo, Trevor N. Mudge, Yuming Zhu, Chaitali...
ASE
2007
121views more  ASE 2007»
13 years 7 months ago
Computer-aided Support for Secure Tropos
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Fabio Massacci, John Mylopoulos, Nicola Zannone
WWW
2005
ACM
14 years 26 days ago
Automated synthesis of executable web service compositions from BPEL4WS processes
We propose a technique for the automated synthesis of new comeb services. Given a set of abstract BPEL4WS descriptions of component services, and a composition requirement, we aut...
Marco Pistore, Paolo Traverso, Piergiorgio Bertoli...