Sciweavers

1352 search results - page 6 / 271
» Designing Security Requirements Models Through Planning
Sort
View
JSSPP
2005
Springer
15 years 8 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin
ICECCS
1995
IEEE
94views Hardware» more  ICECCS 1995»
15 years 6 months ago
Requirements for client/server performance modeling
Design, performance management, and capacity planning of client/server applications in the commercial enterprise depends on the ability to model these distributed applications at ...
Joseph J. Martinka
127
Voted
ICSE
2003
IEEE-ACM
16 years 3 months ago
Moving from Quality Attribute Requirements to Architectural Decisions
Quality attribute models are proposed as the linkage between a specification of a quality attribute requirement and a design fragment that is focused on achieving that requirement...
Felix Bachmann, Len Bass, Mark Klein
HICSS
2010
IEEE
203views Biometrics» more  HICSS 2010»
15 years 10 months ago
Secure Planning of Order Picking Systems with the Aid of Simulation
Planning a new logistics center is a quite difficult job. Depending on the requirements there are a great number of possible design versions. The planner has to consider not only ...
Alexander Ulbrich, Stefan Galka, Willibald A. G&uu...
SIGUCCS
2003
ACM
15 years 8 months ago
The SNet model: access, security and e-services for students
This paper will explore the SNet model that Hunter College of the City University of New York developed and implemented. During the Spring of 2002, CUNY as a central organization ...
Anand Padmanabhan