Sciweavers

407 search results - page 19 / 82
» An Automated Verification Method for Distributed Systems Sof...
Sort
View
ICSE
2007
IEEE-ACM
14 years 8 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
RE
2002
Springer
13 years 8 months ago
Automating Speculative Queries through Event-Based Requirements Traceability
Posing speculative questions about a software system is an important yet often unsupported activity. Current impact analysis techniques tend to focus upon the functionality of the...
Jane Cleland-Huang, Carl K. Chang, Gaurav Sethi, K...
IPC
2007
IEEE
14 years 2 months ago
Intelligent Search Mechanism Based on Neuro-Fuzzy System for the Distributed Object Groups
Current research in distributed systems focuses on object group models which are designed for scalable systems and provide accessible objects to the entire group. However, dynamic...
Romeo Mark A. Mateo, Bobby D. Gerardo, Jaewan Lee
DAC
2005
ACM
14 years 9 months ago
Simulation based deadlock analysis for system level designs
In the design of highly complex, heterogeneous, and concurrent systems, deadlock detection and resolution remains an important issue. In this paper, we systematically analyze the ...
Xi Chen, Abhijit Davare, Harry Hsieh, Alberto L. S...
CASCON
1996
160views Education» more  CASCON 1996»
13 years 10 months ago
Automatic generation of performance models for distributed application systems
Organizations have become increasingly dependent on computing systems to achieve their business goals. The performance of these systems in terms of response times and cost has a m...
M. Qin, R. Lee, Asham El Rayess, Vidar Vetland, Je...