Sciweavers

3926 search results - page 737 / 786
» Deriving Information Requirements from Responsibility Models
Sort
View
141
Voted
COMSIS
2006
141views more  COMSIS 2006»
15 years 4 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic
ENTCS
2007
143views more  ENTCS 2007»
15 years 4 months ago
Formal Fault Tree Analysis - Practical Experiences
Safety is an important requirement for many modern systems. To ensure safety of complex critical systems, well-known safety analysis methods have been formalized. This holds in pa...
Frank Ortmeier, Gerhard Schellhorn
TWC
2008
172views more  TWC 2008»
15 years 4 months ago
A Software-Defined Radio System for Backscatter Sensor Networks
Backscatter radio is proposed for sensor networks. In that way, the transmitter for each sensor is simplified to a transistor connected to an antenna and therefore, the cost for ea...
Giovanni Vannucci, Aggelos Bletsas, Darren Leigh
TSE
1998
85views more  TSE 1998»
15 years 3 months ago
A Methodology for Feature Interaction Detection in the AIN 0.1 Framework
—In this paper, we propose an integrated methodology for specifying AIN and switch-based features and analyzing their interactions in the AIN 0.1 framework. The specification of ...
Fuchun Joseph Lin, Hong Liu, Abhijit Ghosh
PVLDB
2008
116views more  PVLDB 2008»
15 years 3 months ago
Accuracy estimate and optimization techniques for SimRank computation
The measure of similarity between objects is a very useful tool in many areas of computer science, including information retrieval. SimRank is a simple and intuitive measure of th...
Dmitry Lizorkin, Pavel Velikhov, Maxim N. Grinev, ...