Sciweavers

1352 search results - page 143 / 271
» Designing Security Requirements Models Through Planning
Sort
View
SIGADA
1999
Springer
14 years 2 months ago
Towards a distributed object-oriented propagation model using Ada95
Representing interdependencies between the objects of an object-oriented software application requires designtime mechanisms for specifying object interrelationships, as well as s...
Donald M. Needham, Steven A. Demurjian, Thomas J. ...
GLOBECOM
2007
IEEE
14 years 2 months ago
On Modeling VoIP Traffic in Broadband Networks
With the general trend towards ubiquitous access to the Internet, more users will prefer to make voice calls through the Internet. VoIP as the application which facilitates voice c...
Ehsan Haghani, Swades De, Nirwan Ansari
MODELS
2007
Springer
14 years 4 months ago
Using Domain-Specific Modeling to Generate User Interfaces for Wizards
The rising adoption and incorporation of computers into everyday life requires human-computer interaction methods to be efficient and easy to understand. Simultaneously, complexit...
Enis Afgan, Jeffrey G. Gray, Purushotham Bangalore
ISLPED
2009
ACM
110views Hardware» more  ISLPED 2009»
14 years 4 months ago
SOI, interconnect, package, and mainboard thermal characterization
This paper presents an evaluation to determine the importance of the accurate thermal characterization for several elements of a semiconductor device. Specifically, it evaluates ...
Joseph Nayfach-Battilana, Jose Renau
ICISC
2009
169views Cryptology» more  ICISC 2009»
13 years 8 months ago
Generic One Round Group Key Exchange in the Standard Model
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplif...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...