Sciweavers

1411 search results - page 190 / 283
» Case Studies of an Insider Framework
Sort
View
CAISE
2008
Springer
13 years 11 months ago
On Modeling and Analyzing Cost Factors in Information Systems Engineering
Introducing enterprise information systems (EIS) is usually associated with high costs. It is therefore crucial to understand those factors that determine or influence these costs....
Bela Mutschler, Manfred Reichert
EMSOFT
2006
Springer
13 years 11 months ago
Reusable models for timing and liveness analysis of middleware for distributed real-time and embedded systems
Distributed real-time and embedded (DRE) systems have stringent constraints on timeliness and other properties whose assurance is crucial to correct system behavior. Formal tools ...
Venkita Subramonian, Christopher D. Gill, Cé...
COMMA
2008
13 years 10 months ago
A Methodology for Action-Selection using Value-Based Argumentation
This paper describes a method for decision making using argumentation. The method is intended to produce the decision considered most likely to promote the agent's aims and as...
Fahd Saud Nawwab, Trevor J. M. Bench-Capon, Paul E...
SBBD
2004
103views Database» more  SBBD 2004»
13 years 10 months ago
Modelagem de Bibliotecas Digitais usando a Abordagem 5S: Um Estudo de Caso
An enormous amount of information is currently available through specialized services of digital libraries (DLs). However the specification and development of DLs are very complex...
David Patricio Viscarra del Pozo, Lena Veiga e Sil...
CSL
2010
Springer
13 years 10 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers