Sciweavers

1368 search results - page 93 / 274
» A Hybrid Reputation Model Based on the Use of Organizations
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 4 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
SAC
2008
ACM
13 years 9 months ago
A hybrid software-based self-testing methodology for embedded processor
Software-based self-test (SBST) is emerging as a promising technology for enabling at-speed testing of high-speed embedded processors testing in an SoC system. For SBST, test rout...
Tai-Hua Lu, Chung-Ho Chen, Kuen-Jong Lee
SASO
2009
IEEE
14 years 4 months ago
MOCAS: A State-Based Component Model for Self-Adaptation
This paper introduces MOCAS (Model Of Components for Adaptive Systems), a generic state-based component model which enables the self-adaptation of software components together wit...
Cyril Ballagny, Nabil Hameurlain, Franck Barbier
CIBCB
2007
IEEE
14 years 2 months ago
Genetic Regulatory Network Modeling Using Network Component Analysis and Fuzzy Clustering
Gene regulatory network model is the most widely used mechanism to model and predict the behavior of living organisms. Network Component Analysis (NCA) as an emerging issue for unc...
Fatemeh Bakouie, Mohammad Hassan Moradi
IWIA
2005
IEEE
14 years 3 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott