Sciweavers

427 search results - page 22 / 86
» Applying Aspect-Orientation in Designing Security Systems: A...
Sort
View
CRITIS
2007
13 years 9 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
AOSD
2011
ACM
13 years 2 months ago
Experiences documenting and preserving software constraints using aspects
Software systems are increasingly being built as compositions of reusable artifacts (components, frameworks, toolkits, plug-ins, APIs, etc) that have non-trivial usage constraints...
Roberto Silveira Silva Filho, François Bron...
ASE
2008
120views more  ASE 2008»
13 years 7 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
BMCBI
2004
252views more  BMCBI 2004»
13 years 7 months ago
Applying Support Vector Machines for Gene ontology based gene function prediction
Background: The current progress in sequencing projects calls for rapid, reliable and accurate function assignments of gene products. A variety of methods has been designed to ann...
Arunachalam Vinayagam, Rainer König, Jutta Mo...
IWSOS
2009
Springer
14 years 2 months ago
A Survey of Models and Design Methods for Self-organizing Networked Systems
Self-organization, whereby through purely local interactions, global order and structure emerge, is studied broadly across many fields of science, economics, and engineering. We ...
Wilfried Elmenreich, Raissa D'Souza, Christian Bet...