Sciweavers

144 search results - page 4 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
CCS
2006
ACM
13 years 11 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
RTSS
1999
IEEE
13 years 11 months ago
High-Level Modeling and Analysis of TCAS
In this paper, we demonstrate a high-level approach to modeling and analyzing complex safety-critical systems through a case study in the area of air traffic management. In partic...
Carolos Livadas, John Lygeros, Nancy A. Lynch
SMC
2010
IEEE
139views Control Systems» more  SMC 2010»
13 years 5 months ago
Pin-pointing concept descriptions
In this study, the task of obtaining accurate and comprehensible concept descriptions of a specific set of production instances has been investigated. The suggested method, inspire...
Cecilia Sönströd, Ulf Johansson, Henrik ...
WETICE
2005
IEEE
14 years 1 months ago
Challenges and Solutions for Model Driven Web Service Composition
System theory propagates the use of models which e level of abstraction to cope with complexity, evolving out of variety and connectivity. Different modeling techniques have been ...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...
PR
2006
84views more  PR 2006»
13 years 7 months ago
Clustering techniques for protein surfaces
Though most approaches to protein comparison are based on their structure, several studies produced evidence of a strict correlation between the surface characteristics of protein...
Lorenzo Baldacci, Matteo Golfarelli, Alessandra Lu...