Sciweavers

5101 search results - page 785 / 1021
» Capturing Context Requirements
Sort
View
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
14 years 18 days ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
VLSID
1999
IEEE
93views VLSI» more  VLSID 1999»
14 years 18 days ago
Spec-Based Repeater Insertion and Wire Sizing for On-chip Interconnect
Recently Lillis, et al. presented an elegant dynamic programming approach to RC interconnect delay optimization through driver sizing, repeater insertion, and, wire sizing which e...
Noel Menezes, Chung-Ping Chen
ICSE
1999
IEEE-ACM
14 years 18 days ago
Haemo Dialysis Software Architecture Design Experiences
In this paper we present the experiences and architecture from a research project conducted in cooperation with two industry partners. The goal of the project was to reengineer an...
PerOlof Bengtsson, Jan Bosch
ICSE
1999
IEEE-ACM
14 years 18 days ago
Product-Line Architectures in Industry: A Case Study
In this paper, a case study investigating the experiences from using product-line architectures is presented involving two swedish companies, Axis Communications AB and Securitas ...
Jan Bosch
ICCAD
1998
IEEE
94views Hardware» more  ICCAD 1998»
14 years 18 days ago
Noise considerations in circuit optimization
Noise can cause digital circuits to switch incorrectly and thus produce spurious results. Noise can also have adverse power, timing and reliability e ects. Dynamic logic is partic...
Andrew R. Conn, Ruud A. Haring, Chandramouli Viswe...