Sciweavers

1352 search results - page 125 / 271
» Designing Security Requirements Models Through Planning
Sort
View
114
Voted
WSC
2008
15 years 5 months ago
Modeling and simulation of integrated intelligent systems
Complex systems consist of a large number of entities with their independent local rules and goals, along with their interactions. The effect of these properties tends to produce ...
Yongchang Li, Michael Balchanos, Bassem Nairouz, N...
132
Voted
AMW
2010
15 years 4 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
156
Voted
BMCBI
2008
115views more  BMCBI 2008»
15 years 3 months ago
Systems biology driven software design for the research enterprise
Background: In systems biology, and many other areas of research, there is a need for the interoperability of tools and data sources that were not originally designed to be integr...
John Boyle, Christopher C. Cavnor, Sarah A. Killco...
ICST
2009
IEEE
15 years 1 months ago
Putting Formal Specifications under the Magnifying Glass: Model-based Testing for Validation
A software development process is conceptually an abstract form of model transformation, starting from an enduser model of requirements, through to a system model for which code c...
Emine G. Aydal, Richard F. Paige, Mark Utting, Jim...
CHI
2006
ACM
16 years 3 months ago
"Sketching" nurturing creativity: commonalities in art, design, engineering and research
icians or philosophers use abstract symbols to derive formulas or form proofs. Indeed, these sketches are structural geometric proofs, consistent with Plato's supposition that...
Kumiyo Nakakoji, Atau Tanaka, Daniel Fallman