Sciweavers

769 search results - page 14 / 154
» Identifying objects in legacy systems
Sort
View
DSN
2008
IEEE
13 years 9 months ago
Using an assurance case to support independent assessment of the transition to a new GPS ground control system
We describe a specific application of assurance cases to the problem of ensuring that a transition from a legacy system to its replacement will not compromise mission assurance ob...
Elisabeth A. Nguyen, William S. Greenwell, Myron H...
EUC
2008
Springer
13 years 9 months ago
A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems
The kernel objects consist of critical kernel data structures and system call functions, which are the most important data for a system, should be protected as first-class candida...
Lei Sun, Tatsuo Nakajima
AINA
2007
IEEE
13 years 11 months ago
Verifying Identifier-Authenticity in Ubiquitous Computing Environment
In ubiquitous computing environment, identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. However, si...
Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Nobo...
APSEC
2004
IEEE
13 years 11 months ago
A Systematic Method to Identify Software Components
In component-based development (CBD), component is the basic unit for reuse and it provides a relatively coarse-grained functionality. A component typically consists of several re...
Soo Dong Kim, Soo Ho Chang
GIR
2006
ACM
14 years 1 months ago
Identifying and grounding descriptions of places
In this paper we test the hypothesis Given a piece of text describing an object or concept our combined disambiguation method can disambiguate whether it is a place and ground it ...
Simon E. Overell, Stefan M. Rüger