Sciweavers

411 search results - page 73 / 83
» Controlling Requirements Evolution: An Avionics Case Study
Sort
View
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 8 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
SEUS
2009
IEEE
14 years 2 months ago
Exploring the Design Space for Network Protocol Stacks on Special-Purpose Embedded Systems
Many special-purpose embedded systems such as automobiles and aircrafts consist of multiple embedded controllers connected through embedded network interconnects. Such network inte...
Hyun-Wook Jin, Junbeom Yoo
INFOCOM
2007
IEEE
14 years 1 months ago
Balancing Interruption Frequency and Buffering Penalties in VBR Video Streaming
—The main goal of a streaming application is to enable the successful decoding of each video object before its displaying deadline is violated, and to recover from a deadline vio...
Guanfeng Liang, Ben Liang
EDCC
2010
Springer
14 years 12 days ago
Software Process Synthesis in Assurance Based Development of Dependable Systems
—Assurance Based Development (ABD) is a novel approach to the synergistic construction of critical software systems and their assurance arguments. In ABD, the need for assurance ...
Patrick J. Graydon, John C. Knight
ACIVS
2006
Springer
13 years 11 months ago
Affine Epipolar Direction from Two Views of a Planar Contour
Most approaches to camera motion estimation from image sequences require matching the projections of at least 4 non-coplanar points in the scene. The case of points lying on a plan...
Maria Alberich-Carramiñana, Guillem Aleny&a...