Sciweavers

597 search results - page 33 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
13 years 11 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
IWPC
2002
IEEE
14 years 14 days ago
Where's the Schema? A Taxonomy of Patterns for Software Exchange
Program comprehension tools extract, organize and analyze information about the design and implementation of software systems. Before tools can exchange information, they must sha...
Dean Jin, James R. Cordy, Thomas R. Dean
B
2007
Springer
14 years 1 months ago
Time Constraint Patterns for Event B Development
Distributed applications are based on algorithms which should be able to deal with time constraints. It is mandatory to express time constraints in (mathematical) models and the cu...
Dominique Cansell, Dominique Méry, Joris Re...
COMPSAC
2005
IEEE
14 years 1 months ago
Situation-Awareness for Adaptive Coordination in Service-Based Systems
Service-based systems have many applications, including collaborative research and development, ebusiness, health care, environmental control, military applications, and homeland ...
Stephen S. Yau, Dazhi Huang, Haishan Gong, Hasan D...
IADIS
2003
13 years 9 months ago
Shorter Time-To-Market Through a Pattern-Driven Architectural Framework
Developing and evolving complex Web-based systems with strict requirement for shorter time-to-market needs good and systematic engineering approaches and especially an elegant way...
Jianyun Zhou, Tor Stålhane