Sciweavers

423 search results - page 25 / 85
» Formal access control analysis in the software development p...
Sort
View
RTSS
1999
IEEE
14 years 1 months ago
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols
The e ective design of composite dependable and real-time protocols entails demonstrating their proof of correctness and, in practice, the e cient delivery of services. We focus o...
Purnendu Sinha, Neeraj Suri
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
14 years 1 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
BMCBI
2005
137views more  BMCBI 2005»
13 years 8 months ago
ArrayQuest: a web resource for the analysis of DNA microarray data
Background: Numerous microarray analysis programs have been created through the efforts of Open Source software development projects. Providing browser-based interfaces that allow...
Gary L. Argraves, Saurin D. Jani, Jeremy L. Barth,...
BPM
2008
Springer
207views Business» more  BPM 2008»
13 years 10 months ago
From Personal Task Management to End-User Driven Business Process Modeling
The need to involve business users in process modeling is largely perceived in the context of Business Process Management systems. This can facilitate the elaboration of consistent...
Todor Stoitsev, Stefan Scheidl, Felix Flentge, Max...
SEFM
2005
IEEE
14 years 2 months ago
Formalising Control in Robust Spoken Dialogue Systems
The spoken language interface is now becoming an increasingly serious research topic with application to a wide range of highly engineered systems. Such systems not only include i...
Hui Shi, Robert J. Ross, John A. Bateman