Sciweavers

2740 search results - page 117 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
ACSAC
2005
IEEE
14 years 4 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
ER
1998
Springer
145views Database» more  ER 1998»
14 years 2 months ago
Design and Analysis of Quality Information for Data Warehouses
Data warehouses are complex systems that have to deliver highly-aggregated, high quality data from heterogeneous sources to decision makers. Due to the dynamic change in the requir...
Manfred A. Jeusfeld, Christoph Quix, Matthias Jark...
IAT
2010
IEEE
13 years 8 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
FGCS
2006
125views more  FGCS 2006»
13 years 10 months ago
Compressible memory data structures for event-based trace analysis
The article presents a new compressible memory data structure for trace events. Its primary intention is to aid the analysis of huge traces by reducing the memory requirements sig...
Andreas Knüpfer, Wolfgang E. Nagel
ICA
2004
Springer
14 years 3 months ago
Post-nonlinear Independent Component Analysis by Variational Bayesian Learning
Post-nonlinear (PNL) independent component analysis (ICA) is a generalisation of ICA where the observations are assumed to have been generated from independent sources by linear mi...
Alexander Ilin, Antti Honkela