Sciweavers

1352 search results - page 90 / 271
» Designing Security Requirements Models Through Planning
Sort
View
IEE
2008
120views more  IEE 2008»
13 years 9 months ago
Reducing the use of nullable types through non-null by default and monotonic non-null
With Java 5 annotations, we note a marked increase in tools that can statically detect potential null dereferences. To be effective such tools require that developers annotate decl...
Patrice Chalin, Perry R. James, Frédé...
COMPSAC
2008
IEEE
14 years 3 months ago
Embedded Systems Resources: Views on Modeling and Analysis
The conflicting requirements of real-time embedded systems, e.g. minimizing memory usage while still ensuring that all deadlines are met at run-time, require rigorous analysis of...
Aneta Vulgarakis, Cristina Cerschi Seceleanu
WETICE
1997
IEEE
14 years 1 months ago
MultiDisciplinary Design for Uninhabited Air Vehicles
Contemporary product design and process development is based on an iterative specify-evaluate-revise approach which is often time intensive and therein non-responsive to customer ...
Max Blair, Steven R. LeClair, Jeffrey V. Zweber, A...
LATINCRYPT
2010
13 years 7 months ago
Mediated Traceable Anonymous Encryption
the full version of the extended abstract which appears in Latincrypt '10 (august 8-11, 2010, Puebla, Mexico) M. Abdalla and P. Barreto Eds., Springer-Verlag, LNCS 6212, pages...
Malika Izabachène, David Pointcheval, Damie...
CAISE
2003
Springer
14 years 2 months ago
Towards the Automation of Data Warehouse Logical Design: a Rule-Based Approach
Data Warehouse logical design involves the definition of structures that enable an efficient access to information. The designer builds relational or multidimensional structures ta...
Verónika Peralta, Alvaro Illarze, Raul Rugg...