Sciweavers

180 search results - page 23 / 36
» A lightweight technique for assessing risks in requirements ...
Sort
View
ETS
2011
IEEE
224views Hardware» more  ETS 2011»
12 years 7 months ago
AVF Analysis Acceleration via Hierarchical Fault Pruning
—The notion of Architectural Vulnerability Factor (AVF) has been extensively used by designers to evaluate various aspects of design robustness. While AVF is a very accurate way ...
Michail Maniatakos, Chandra Tirumurti, Abhijit Jas...
SCS
2004
13 years 8 months ago
HazLog: Tool Support for Hazard Management
Industry is increasingly adopting software and system safety standards that mandate the use of hazard logs in the development and operation of safety critical systems. Hazard logs...
Christian Hamoy, David Hemer, Peter A. Lindsay
GI
2009
Springer
13 years 5 months ago
AnToNIa: A Software Tool for the Hemodynamic Analysis of Cerebral Vascular Malformations Using 3D and 4D MRA Image Sequences
Abstract: Stroke is the second most common cause of death and major cause of disability worldwide. Approx. 20% of cerebral strokes are caused by hemorrhages due to rupture of cereb...
Nils Daniel Forkert, Dennis Säring, Jens Fieh...
FUIN
2007
147views more  FUIN 2007»
13 years 7 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 9 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...