Sciweavers

752 search results - page 93 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
COOP
2004
15 years 5 months ago
Model Checking Groupware Protocols
Abstract. The enormous improvements in the efficiency of model-checking techniques in recent years facilitates their application to ever more complex systems of concurrent and dist...
Maurice H. ter Beek, Mieke Massink, Diego Latella,...
127
Voted
UM
2007
Springer
15 years 9 months ago
Eliciting Motivation Knowledge from Log Files Towards Motivation Diagnosis for Adaptive Systems
Motivation is well-known for its importance in learning and its influence on cognitive processes. Adaptive systems would greatly benefit from having a user model of the learner’s...
Mihaela Cocea, Stephan Weibelzahl
104
Voted
ICPADS
2006
IEEE
15 years 9 months ago
Experiences with Simulations - A Light and Fast Model for Secure Web Applications
Using simulations of a complex system such as a Web Application Server provides us with a tool that allows the running of tests without using the resources needed in a real system...
Ramon Nou, Jordi Guitart, David Carrera, Jordi Tor...
147
Voted
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
15 years 7 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...
137
Voted
RTAS
2005
IEEE
15 years 9 months ago
Timing Analysis of TCP Servers for Surviving Denial-of-Service Attacks
— Denial-of-service attacks are becoming more frequent and sophisticated. Researchers have proposed a variety of defenses, including better system configurations, infrastructure...
V. Krishna Nandivada, Jens Palsberg