Sciweavers

271 search results - page 39 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
ICSE
2005
IEEE-ACM
14 years 7 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
ICWS
2008
IEEE
13 years 9 months ago
Communications Semantics for WSBPEL Processes
WSBPEL [2] opens up the possibility of applying a range of formal techniques to the verification of Web service behaviors from two points of view: constraints between activities w...
Walid Fdhila, Mohsen Rouached, Claude Godart
ICST
2009
IEEE
14 years 2 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
BMCBI
2010
105views more  BMCBI 2010»
13 years 8 months ago
GWAMA: software for genome-wide association meta-analysis
Background: Despite the recent success of genome-wide association studies in identifying novel loci contributing effects to complex human traits, such as type 2 diabetes and obesi...
Reedik Mägi, Andrew P. Morris
ICMENS
2005
IEEE
134views Hardware» more  ICMENS 2005»
14 years 1 months ago
Contact Mechanics Description of Inelastic Displacement Response of a Nano-Positioning Device
– A classical mechanistic model was developed to capture the existence of pre-sliding tangential deflection (PSTD) in contacting polysilicon and coated polysilicon surfaces. For ...
Michael J. Starra, E. David Reedy, Alex D. Corwina...