Sciweavers

1352 search results - page 61 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ELPUB
2007
ACM
14 years 24 days ago
Challenges in the Selection, Design and Implementation of an Online Submission and Peer Review System for STM Journals
Two international scientific publishers collaborated to develop an Online Submission and Peer Review System (OSPREY) for their journals. Our goals were to meet market demand, incr...
Judy Best, Richard Akerman
INFORMS
2010
145views more  INFORMS 2010»
13 years 7 months ago
An Automated Intensity-Modulated Radiation Therapy Planning System
We design and implement an intensity-modulated radiation therapy (IMRT) plan generation technology that effectively and efficiently optimizes beam geometry as well as beam intens...
Shabbir Ahmed, Ozan Gozbasi, Martin W. P. Savelsbe...
STORAGESS
2006
ACM
14 years 2 months ago
Scalable security for large, high performance storage systems
New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and effici...
Andrew W. Leung, Ethan L. Miller
CCGRID
2005
IEEE
14 years 2 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
IADIS
2003
13 years 10 months ago
Shorter Time-To-Market Through a Pattern-Driven Architectural Framework
Developing and evolving complex Web-based systems with strict requirement for shorter time-to-market needs good and systematic engineering approaches and especially an elegant way...
Jianyun Zhou, Tor Stålhane