Sciweavers

3104 search results - page 4 / 621
» Competence-Based EE-Learning: (How) Can We Implement It
Sort
View
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
15 years 5 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...
FORTE
2004
15 years 5 months ago
How Synchronisation Strategy Approximation in PEPA Implementations Affects Passage Time Performance Results
Passage time densities are useful performance measurements in stochastic systems. With them the modeller can extract probabilistic quality-of-service guarantees such as: the proba...
Jeremy T. Bradley, Stephen T. Gilmore, Nigel Thoma...
WONS
2012
IEEE
13 years 11 months ago
Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?
—The recent arrival of 6LoWPAN, an IPv6 variant for low-power wireless devices, allows for the development of IPbased applications for low-power wireless networks like sensor net...
Marcel Bosling, Torsten Redmann, Jean Tekam, Elias...
APSEC
2003
IEEE
15 years 9 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
174
Voted
DSS
2011
14 years 7 months ago
How much to spend on flexibility? Determining the value of information system flexibility
In the current paper, we outline several approaches to determine the value of information system (IS) flexibility, defined as the extent to which an IS can be modified and upgrade...
Franz Schober, Judith Gebauer