Sciweavers

739 search results - page 127 / 148
» A security framework for the analysis and design of software...
Sort
View
CHI
2007
ACM
14 years 8 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
MODELS
2007
Springer
14 years 1 months ago
UML2Alloy: A Challenging Model Transformation
Abstract. Alloy is a formal language, which has been applied to modelling of systems in a wide range of application domains. It is supported by Alloy Analyzer, a tool, which allows...
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, ...
SOSP
2005
ACM
14 years 4 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
COMPSAC
2008
IEEE
14 years 2 months ago
Error Modeling in Dependable Component-Based Systems
Component-Based Development (CBD) of software, with its successes in enterprise computing, has the promise of being a good development model due to its cost effectiveness and pote...
Hüseyin Aysan, Sasikumar Punnekkat, Radu Dobr...
SBACPAD
2006
IEEE
102views Hardware» more  SBACPAD 2006»
14 years 1 months ago
Ultra-Fast CPU Performance Prediction: Extending the Monte Carlo Approach
Performance evaluation of contemporary processors is becoming increasingly difficult due to the lack of proper frameworks. Traditionally, cycle-accurate simulators have been exte...
Ram Srinivasan, Jeanine Cook, Olaf M. Lubeck