Sciweavers

5101 search results - page 785 / 1021
» Capturing Context Requirements
Sort
View
113
Voted
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 7 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
143
Voted
VLSID
1999
IEEE
93views VLSI» more  VLSID 1999»
15 years 7 months ago
Spec-Based Repeater Insertion and Wire Sizing for On-chip Interconnect
Recently Lillis, et al. presented an elegant dynamic programming approach to RC interconnect delay optimization through driver sizing, repeater insertion, and, wire sizing which e...
Noel Menezes, Chung-Ping Chen
ICSE
1999
IEEE-ACM
15 years 7 months ago
Haemo Dialysis Software Architecture Design Experiences
In this paper we present the experiences and architecture from a research project conducted in cooperation with two industry partners. The goal of the project was to reengineer an...
PerOlof Bengtsson, Jan Bosch
132
Voted
ICSE
1999
IEEE-ACM
15 years 7 months ago
Product-Line Architectures in Industry: A Case Study
In this paper, a case study investigating the experiences from using product-line architectures is presented involving two swedish companies, Axis Communications AB and Securitas ...
Jan Bosch
126
Voted
ICCAD
1998
IEEE
94views Hardware» more  ICCAD 1998»
15 years 7 months ago
Noise considerations in circuit optimization
Noise can cause digital circuits to switch incorrectly and thus produce spurious results. Noise can also have adverse power, timing and reliability e ects. Dynamic logic is partic...
Andrew R. Conn, Ruud A. Haring, Chandramouli Viswe...