Sciweavers

2082 search results - page 24 / 417
» Change Paths in Reasoning!
Sort
View
IFIP
2004
Springer
14 years 29 days ago
Reasoning about Secure Interoperation Using Soft Constraints
Abstract The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for sy...
Stefano Bistarelli, Simon N. Foley, Barry O'Sulliv...
MSR
2005
ACM
14 years 1 months ago
Analysis of signature change patterns
Software continually changes due to performance improvements, new requirements, bug fixes, and adaptation to a changing operational environment. Common changes include modificatio...
Sunghun Kim, E. James Whitehead Jr., Jennifer Beva...
ICST
2008
IEEE
14 years 2 months ago
Empirical Software Change Impact Analysis using Singular Value Decomposition
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how fil...
Mark Sherriff, Laurie Williams
ICC
2008
IEEE
138views Communications» more  ICC 2008»
14 years 2 months ago
Dealing with Sudden Bandwidth Changes in TCP
— In this paper, we propose a novel technique to deal with sudden bandwidth changes in TCP. In the current Internet, sudden bandwidth changes may occur due to vertical handovers ...
Euiyul Ko, Donghyeok An, Ikjun Yeom
MSS
2007
IEEE
112views Hardware» more  MSS 2007»
14 years 1 months ago
E-Beam Hard Disk Drive Using Gated Carbon Nano Tube Source and Phase Change Media
A novel high speed, high capacity electron-beam recording technique using nano technology in a Hard Disk Drive form factor is described. The e- beam source is a carbon nanotube...
William S. Oakley