Sciweavers

1352 search results - page 150 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CII
2007
73views more  CII 2007»
13 years 10 months ago
Competency characterisation by means of work situation modelling
Nowadays companies have to face the rapid evolution of their competitive environment. In the field of design, project managers are aware of both the impact of the designers’ com...
Farouk Belkadi, Eric Bonjour, Maryvonne Dulmet
ICML
1998
IEEE
14 years 11 months ago
Heading in the Right Direction
Stochastic topological models, and hidden Markov models in particular, are a useful tool for robotic navigation and planning. In previous work we have shown how weak odometric dat...
Hagit Shatkay, Leslie Pack Kaelbling
SIGECOM
1999
ACM
202views ECommerce» more  SIGECOM 1999»
14 years 2 months ago
A methodology for workload characterization of E-commerce sites
Performance analysis and capacity planning for e-commerce sites poses an interesting problem: how to best characterize the workload of these sites. Tradition al workload character...
Daniel A. Menascé, Virgilio Almeida, Rodrig...
SAFECOMP
1998
Springer
14 years 2 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 3 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay