Sciweavers

1418 search results - page 100 / 284
» How to Explain Mistakes
Sort
View
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
14 years 3 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
ICPADS
2005
IEEE
14 years 3 months ago
Systematic Performance Modeling and Characterization of Heterogeneous IP Networks
Accurate measurement and modeling of IP networks is essential for network design, planning, and management. Efforts are being made to detect the state of the network from end-to-e...
Alessio Botta, Donato Emma, Antonio Pescapè...
SEFM
2005
IEEE
14 years 3 months ago
Omnibus Verification Policies: A flexible, configurable approach to assertion-based software verification
The three main assertion-based verification approaches are: Design by Contract (DBC), Extended Static Checking (ESC) and Verified Design by Contract (VDBC). Each approach offers a...
Thomas Wilson, Savi Maharaj, Robert G. Clark
SEUS
2005
IEEE
14 years 3 months ago
Resource Management Based on Personal Service Aggregations in Smart Spaces
This paper introduces a novel resource management approach based on personal service aggregations(PSAs) for smart spaces. As a smart space is usually a sharable system that simult...
Peifeng Xiang, Yuanchun Shi
WECWIS
2005
IEEE
79views ECommerce» more  WECWIS 2005»
14 years 3 months ago
Enabling DRM-Preserving Digital Content Redistribution
Traditionally, the process of online digital content distribution has involved a limited number of centralised distributors selling protected contents and licenses authorising the...
Srijith Krishnan Nair, Bogdan C. Popescu, Chandana...