Sciweavers

378 search results - page 30 / 76
» Automating Coinduction with Case Analysis
Sort
View
116
Voted
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 9 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
CONCUR
2006
Springer
15 years 6 months ago
A Livelock Freedom Analysis for Infinite State Asynchronous Reactive Systems
We describe an incomplete but sound and efficient livelock freedom test for infinite state asynchronous reactive systems. The method s a system into a set of simple control flow cy...
Stefan Leue, Alin Stefanescu, Wei Wei
127
Voted
ISSE
2010
15 years 1 months ago
URDAD as a semi-formal approach to analysis and design
The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object M...
Fritz Solms, Dawid Loubser
DAC
2006
ACM
16 years 4 months ago
Charge recycling in MTCMOS circuits: concept and analysis
Designing an energy efficient power gating structure is an important and challenging task in Multi-Threshold CMOS (MTCMOS) circuit design. In order to achieve a very low power des...
Ehsan Pakbaznia, Farzan Fallah, Massoud Pedram
ICCBR
2009
Springer
15 years 9 months ago
Adaptation versus Retrieval Trade-Off Revisited: An Analysis of Boundary Conditions
In this paper we revisit the trade-off between adaptation and retrieval effort traditionally held as a principle in case-based reasoning. This principle states that the time needed...
Stephen Lee-Urban, Héctor Muñoz-Avil...