Sciweavers

180 search results - page 7 / 36
» A lightweight technique for assessing risks in requirements ...
Sort
View
IEEEARES
2009
IEEE
14 years 1 months ago
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests
—The security assessment of the ICT components of critical infrastructures is nowadays a prominent problem. Risk assessment methodologies require, in order to be effective, to be...
Marcelo Masera, Igor Nai Fovino
DT
2006
98views more  DT 2006»
13 years 6 months ago
Handling variations and uncertainties
The widely used engineering decisions concerning the performance of technological equipment for process industries are usually deterministic. Since the early 1990s probabilistic m...
Tim Cheng
ICSE
2007
IEEE-ACM
14 years 26 days ago
Agility and Experimentation: Practical Techniques for Resolving Architectural Tradeoffs
This paper outlines our experiences with making architectural tradeoffs between performance, availability, security, and usability, in light of stringent cost and time-to-market c...
T. C. Nicholas Graham, Rick Kazman, Chris Walmsley
BDA
2003
13 years 8 months ago
Memory Requirements for Query Execution in Highly Constrained Devices
Pervasive computing introduces data management requirements that must be tackled in a growingvariety of lightweight computing devices. Personal folders on chip, networks of sensor...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
CSMR
1998
IEEE
13 years 11 months ago
A Method for Assessing Legacy Systems for Evolution
Legacy systems are usually critical to the business in which they operate, but the costs of running them are often not justifiable. Determining whether such systems are worth keep...
Jane Ransom, Ian Sommerville, Ian Warren