Sciweavers

409 search results - page 49 / 82
» E-Net Models of a Software System for E-Mail Security
Sort
View
TASE
2008
IEEE
13 years 10 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
UML
2005
Springer
14 years 3 months ago
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques
Abstract. Aspect-Oriented Modeling (AOM) techniques allow software designers to isolate and address separately solutions for crosscutting concerns (such as security, reliability, n...
Hui Shen, Dorina C. Petriu
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
14 years 2 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...
ICAC
2006
IEEE
14 years 4 months ago
The Laundromat Model for Autonomic Cluster Computing
Traditional High Performance Computing systems require extensive management and suffer from security and configuration problems. This paper presents a new clustermanagement syste...
Jacob Gorm Hansen, Eske Christiansen, Eric Jul
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
14 years 4 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...