Sciweavers

144 search results - page 12 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
DATE
2003
IEEE
151views Hardware» more  DATE 2003»
14 years 27 days ago
Analysis and White-Box Modeling of Weakly Nonlinear Time-Varying Circuits
The architectural study of wireless communication systems typically requires simulations with high-level models for different analog and RF blocks. Among these blocks, frequency-t...
Petr Dobrovolný, Gerd Vandersteen, Piet Wam...
ECIS
2003
13 years 9 months ago
Analysis of interrelations between business models and knowledge management strategies in consulting firms
Knowledge is an important matter for consulting firms − as a resource, as a product or service, and as a trigger for internal value creation processes. Therefore, a strategy for...
Sven Grolik, Dirk Kalmring, Dietrich Lehner, Chiar...
HAIS
2010
Springer
14 years 12 days ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
EICS
2009
ACM
14 years 8 days ago
StateStream: a developer-centric approach towards unifying interaction models and architecture
Complex and dynamic interaction behaviors in applications such as Virtual Reality (VR) systems are difficult to design and develop. Reasons for this include the complexity and lim...
Gerwin de Haan, Frits H. Post
ICCS
2004
Springer
14 years 29 days ago
Direct and Homogeneous Numerical Approaches to Multiphase Flows and Applications
We have studied two approaches to the modeling of bubbly and cavitating fluids. The first approach is based on the direct numerical simulation of gas bubbles using the interface ...
Roman Samulyak, Tianshi Lu, Yarema Prykarpatskyy