Sciweavers

9316 search results - page 47 / 1864
» Analysis of traceback techniques
Sort
View
CSFW
2010
IEEE
14 years 5 days ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
HYBRID
2000
Springer
14 years 3 days ago
Ellipsoidal Techniques for Reachability Analysis
For the reach tube of a linear time-varying system with ellipsoidal bounds on the control variable consider the following approximation problem. Find a tight ellipsoid-valued tube...
Alexander B. Kurzhanski, Pravin Varaiya
EURODAC
1994
IEEE
110views VHDL» more  EURODAC 1994»
14 years 23 hour ago
An experimental analysis of the effectiveness of the circular self-test path technique
Paolo Prinetto, Fulvio Corno, Matteo Sonza Reorda
IUSED
2008
13 years 10 months ago
Enriching Requirements Analysis with the Personas Technique
John W. Castro, Silvia Teresita Acuña, Nata...