Sciweavers

144 search results - page 13 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
CMSB
2006
Springer
13 years 11 months ago
Probabilistic Model Checking of Complex Biological Pathways
Abstract. Probabilistic model checking is a formal verification technique that has been successfully applied to the analysis of systems from a broad range of domains, including sec...
John Heath, Marta Z. Kwiatkowska, Gethin Norman, D...
ISBI
2002
IEEE
14 years 8 months ago
Statistical shape models for segmentation and structural analysis
Biomedical imaging of large patient populations, both cross-sectionally and longitudinally, is becoming a standard technique for noninvasive, in-vivo studies of the pathophysiolog...
Guido Gerig, Martin Andreas Styner, Gábor S...
ESEM
2007
ACM
13 years 11 months ago
Effort Prediction in Iterative Software Development Processes -- Incremental Versus Global Prediction Models
Estimation of development effort without imposing overhead on the project and the development team is of paramount importance for any software company. This study proposes a new e...
Pekka Abrahamsson, Raimund Moser, Witold Pedrycz, ...
SOSE
2008
IEEE
14 years 1 months ago
Precise Steps for Choreography Modeling for SOA Validation and Verification
Service-oriented architecture (SOA) enables organizations to transform their existing IT infrastructure into a more flexible business process platform.. In this architecture, deco...
Sebastian Wieczorek, Andreas Roth, Alin Stefanescu...
MICRO
2008
IEEE
208views Hardware» more  MICRO 2008»
14 years 2 months ago
Microarchitecture soft error vulnerability characterization and mitigation under 3D integration technology
— As semiconductor processing techniques continue to scale down, transient faults, also known as soft errors, are increasingly becoming a reliability threat to high-performance m...
Wangyuan Zhang, Tao Li