Sciweavers

1352 search results - page 168 / 271
» Designing Security Requirements Models Through Planning
Sort
View
TASLP
2010
99views more  TASLP 2010»
13 years 8 months ago
A Virtual Model of Spring Reverberation
—The digital emulation of analog audio effects and synthesis components, through the simulation of lumped circuit components has seen a large amount of activity in recent years; ...
Stefan Bilbao, Julian Parker
INTERACT
2003
13 years 11 months ago
Evaluation of an Advisor Tool for Scenario Generation
: This study investigates the usefulness of a scenario advisor tool which was designed to be used in the military domain where human or machine errors cause safety-critical problem...
Jae Eun Shin, Alistair G. Sutcliffe, Andreas Grego...
ICCSA
2005
Springer
14 years 3 months ago
Data Protection Based on Physical Separation: Concepts and Application Scenarios
Data protection is an increasingly important issue in today’s communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusi...
Stefan Lindskog, Karl-Johan Grinnemo, Anna Brunstr...
WETICE
2003
IEEE
14 years 3 months ago
Trust Dynamics for Collaborative Global Computing
Recent advances in networking technology have increased the potential for dynamic enterprise collaborations between an open set of entities on a global scale. The security of thes...
Colin English, Sotirios Terzis, Waleed Wagealla, H...
IJMTM
2010
137views more  IJMTM 2010»
13 years 7 months ago
Entry-level engineering professionals and Product Lifecycle Management: a competency model
: In today's rapidly evolving global marketplace, jobs are continually being redefined due to technological innovations and a host of other factors. Workers are also being cal...
Sharron A. Frillman, Kari L. Wilde, Jonathan F. Ko...