Sciweavers

2002 search results - page 56 / 401
» An Approach for Assessment of Reliability of the System Usin...
Sort
View
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
13 years 19 days ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
NIPS
1998
13 years 10 months ago
Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model
Fraud causes substantial losses to telecommunication carriers. Detection systems which automatically detect illegal use of the network can be used to alleviate the problem. Previo...
Jaakko Hollmén, Volker Tresp
DAC
2010
ACM
14 years 25 days ago
Towards scalable system-level reliability analysis
State-of-the-art automatic reliability analyses as used in system-level design approaches mainly rely on Binary Decision Diagrams (BDDs) and, thus, face two serious problems: (1) ...
Michael Glaß, Martin Lukasiewycz, Christian ...
RE
2001
Springer
14 years 1 months ago
Deriving Safety Requirements Using Scenarios
Elicitation of requirements for safety critical aeroengine control systems is dependent on the capture of core design intent and the systematic derivation of requirements addressi...
Karen Allenby, Tim Kelly
NFM
2011
264views Formal Methods» more  NFM 2011»
13 years 3 months ago
Applying Atomicity and Model Decomposition to a Space Craft System in Event-B
Abstract. Event-B is a formal method for modeling and verifying consistency of systems. In formal methods such as Event-B, refinement is the process of enriching or modifying an a...
Asieh Salehi Fathabadi, Abdolbaghi Rezazadeh, Mich...