Sciweavers

141 search results - page 8 / 29
» Application of Vulnerability Discovery Models to Major Opera...
Sort
View
ICSE
2004
IEEE-ACM
14 years 7 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
HOTOS
2003
IEEE
14 years 28 days ago
Development Tools for Distributed Applications
The emergence of the global Internet has dramatically broadened and changed the computing landscape. In particular, much of the value in contemporary computing systems derives fro...
Mukesh Agrawal, Srinivasan Seshan
HOTOS
1999
IEEE
13 years 12 months ago
The Case for Higher-Level Power Management
Reducing the energy consumed in the use of computing devices is becoming a major design challenge. While the problem obviously must be addressed with improved low-level technology...
Carla Schlatter Ellis
ESEC
1997
Springer
13 years 11 months ago
Developing Multimedia Applications with the WinWin Spiral Model
Fifteen teams recently used the WinWin Spiral Model to perform the system engineering and architecting of a set of multimedia applications for the USC Library Information Systems....
Barry W. Boehm, Alexander Egyed, Julie Kwan, Raymo...
DOOD
1995
Springer
102views Database» more  DOOD 1995»
13 years 11 months ago
Active Database Rules with Transaction-Conscious Stable-Model Semantics
Semantics represents a major problem area for active databases inasmuch as (i) there is l framework for defining the abstract semantics of active rules, and (ii) the various syst...
Carlo Zaniolo