Sciweavers

1308 search results - page 96 / 262
» Application of Hazard Analysis to Software Quality Modelling
Sort
View
135
Voted
SACMAT
2009
ACM
15 years 10 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
169
Voted
CAISE
2010
Springer
14 years 10 months ago
Configuring the Variability of Business Process Models Using Non-Functional Requirements
The existence of variations in the organizational environment makes the configuration of business process models a complex activity, even for experienced business analysts. The inc...
Emanuel Santos, João Pimentel, Jaelson Cast...
111
Voted
WETICE
2003
IEEE
15 years 9 months ago
Automatic synthesis of coordinators for COTS group-ware applications: an example
The coordination of concurrent activities in collaborative environments is a very important and difficult task. Many approaches for the construction of large-scale flexible grou...
Paola Inverardi, Massimo Tivoli, Antonio Bucchiaro...
VLSID
2007
IEEE
133views VLSI» more  VLSID 2007»
16 years 4 months ago
On the Impact of Address Space Assignment on Performance in Systems-on-Chip
Today, VLSI systems for computationally demanding applications are being built as Systems-on-Chip (SoCs) with a distributed memory sub-system which is shared by a large number of ...
G. Hazari, Madhav P. Desai, H. Kasture
DAC
2002
ACM
16 years 4 months ago
Hole analysis for functional coverage data
One of the main goals of coverage tools is to provide the user with informative presentation of coverage information. Specifically, information on large, cohesive sets of uncovere...
Oded Lachish, Eitan Marcus, Shmuel Ur, Avi Ziv