Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
This paper presents a method for analyzing the Bit Error Rate of recovered data for PLL-based data recovery systems (DRS) as the PLL comes into lock. This method is based on the a...
Queueing models are routinely used to analyze the performance of software systems. However, contrary to common assumptions, the time that a software server takes to complete jobs ...
This paper proposes a model of successful maintenance that can represent how maintainability of each software module changes as it ages. We found that some of the metrics, measured...
Many software process methods and tools presuppose the existence of a formal model of a process. Unfortunately, developing a formal model for an on-going, complex process can be d...