Sciweavers

356 search results - page 43 / 72
» A Case Study of the Release Management of a Health-care Info...
Sort
View
IWIA
2006
IEEE
14 years 1 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
CAISE
2006
Springer
13 years 11 months ago
Modeling Airport Security Regulations in Focal
We describe the formal models of two standards related to airport security: one at the international level and the other at the European level. These models are expressed using the...
David Delahaye, Jean-Frédéric &Eacut...
DSOM
2003
Springer
14 years 27 days ago
Automating Enterprise Application Placement in Resource Utilities
Abstract. Enterprise applications implement business resource management systems, customer relationship management systems, and general systems for commerce. These applications rel...
Jerry Rolia, Artur Andrzejak, Martin F. Arlitt
SMC
2007
IEEE
105views Control Systems» more  SMC 2007»
14 years 1 months ago
Self-organizing knowledge networks for pervasive situation-aware services
Adapting to current context of usage is of fundamental importance for pervasive computing services. As the technology for acquiring contextual information is increasingly availabl...
Matthias Baumgarten, Nicola Bicocchi, Rico Kusber,...
DEBS
2007
ACM
13 years 11 months ago
High frequency distributed data stream event correlation to improve neonatal clinical management
Approximately eighteen percent (18%) of babies born in New South Wales (NSW), Australia require special care or neonatal intensive care admission. Premature babies can be up to 17...
Carolyn McGregor, Michael Stacey