Sciweavers

1396 search results - page 261 / 280
» DATES: Design Analysis Tool for Enterprise Systems
Sort
View
CHIMIT
2007
ACM
13 years 11 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
13 years 11 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
20
Voted
TSMC
1998
96views more  TSMC 1998»
13 years 7 months ago
The MDS-ANAVA technique for assessing knowledge representation differences between skill groups
—Knowledge representation is one of important factors that determine human performance on cognitive tasks. Due to different levels of experience, different groups of people may d...
Nong Ye
MIDDLEWARE
2010
Springer
13 years 6 months ago
Anonygator: Privacy and Integrity Preserving Data Aggregation
Abstract. Data aggregation is a key aspect of many distributed applications, such as distributed sensing, performance monitoring, and distributed diagnostics. In such settings, use...
Krishna P. N. Puttaswamy, Ranjita Bhagwan, Venkata...
ER
2010
Springer
132views Database» more  ER 2010»
13 years 5 months ago
Full Satisfiability of UML Class Diagrams
UML class diagrams (UCDs) are the de-facto standard formalism for the analysis and design of information systems. By adopting formal language techniques to capture constraints expr...
Alessandro Artale, Diego Calvanese, Yazmin Ang&eac...