Sciweavers

1352 search results - page 71 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ETFA
2006
IEEE
14 years 3 months ago
Design Alternatives in the IEC 61499 Function Block Model
—The International Electro-technical Commission through the 61499 standard establishes the basic infrastructure towards an open market in the control and automation domain. This ...
Kleanthis Thramboulidis
TPDS
2008
106views more  TPDS 2008»
13 years 8 months ago
Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters
Security is increasingly becoming an important issue in the design of real-time parallel applications, which are widely used in the industry and academic organizations. However, ex...
Tao Xie 0004, Xiao Qin
AGENTS
2001
Springer
14 years 1 months ago
A knowledge level software engineering methodology for agent oriented programming
Our goal in this paper is to introduce and motivatea methodology, called Tropos, for building agent oriented software systems. Tropos is based on two key ideas. First, the notion ...
Paolo Bresciani, Anna Perini, Paolo Giorgini, Faus...
AIME
2005
Springer
14 years 2 months ago
Design Patterns for Modelling Guidelines
It is by now widely accepted that medical guidelines can help to significantly improve the quality of medical care. Unfortunately, constructing the required medical guidelines is ...
Radu Serban, Annette ten Teije, Mar Marcos, Cristi...
SIGSOFT
2007
ACM
14 years 9 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna