Sciweavers

1352 search results - page 168 / 271
» Designing Security Requirements Models Through Planning
Sort
View
104
Voted
TASLP
2010
99views more  TASLP 2010»
15 years 1 months ago
A Virtual Model of Spring Reverberation
—The digital emulation of analog audio effects and synthesis components, through the simulation of lumped circuit components has seen a large amount of activity in recent years; ...
Stefan Bilbao, Julian Parker
INTERACT
2003
15 years 4 months ago
Evaluation of an Advisor Tool for Scenario Generation
: This study investigates the usefulness of a scenario advisor tool which was designed to be used in the military domain where human or machine errors cause safety-critical problem...
Jae Eun Shin, Alistair G. Sutcliffe, Andreas Grego...
113
Voted
ICCSA
2005
Springer
15 years 9 months ago
Data Protection Based on Physical Separation: Concepts and Application Scenarios
Data protection is an increasingly important issue in today’s communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusi...
Stefan Lindskog, Karl-Johan Grinnemo, Anna Brunstr...
124
Voted
WETICE
2003
IEEE
15 years 8 months ago
Trust Dynamics for Collaborative Global Computing
Recent advances in networking technology have increased the potential for dynamic enterprise collaborations between an open set of entities on a global scale. The security of thes...
Colin English, Sotirios Terzis, Waleed Wagealla, H...
147
Voted
IJMTM
2010
137views more  IJMTM 2010»
15 years 25 days ago
Entry-level engineering professionals and Product Lifecycle Management: a competency model
: In today's rapidly evolving global marketplace, jobs are continually being redefined due to technological innovations and a host of other factors. Workers are also being cal...
Sharron A. Frillman, Kari L. Wilde, Jonathan F. Ko...