Sciweavers

769 search results - page 30 / 154
» Identifying objects in legacy systems
Sort
View
USS
2008
13 years 10 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
COMPSAC
2002
IEEE
14 years 19 days ago
Framework for Goal Driven System Design
Architecture has been identified as a main tool for high quality system development. It encapsulates the earliest design decisions of the system under development. These decisions...
Juha Savolainen, Juha Kuusela
CSCW
2011
ACM
13 years 2 months ago
Supporting air traffic control collaboration with a TableTop system
Collaboration is key to safety and efficiency in Air Traffic Control. Legacy paper-based systems enable seamless and non-verbal collaboration, but trends in new software and hardw...
Stéphane Conversy, Hélène Gas...
SYSTOR
2009
ACM
14 years 2 months ago
Transactifying Apache's cache module
Apache is a large-scale industrial multi-process and multithreaded application, which uses lock-based synchronization. We report on our experience in modifying Apache’s cache mo...
Haggai Eran, Ohad Lutzky, Zvika Guz, Idit Keidar
IRI
2008
IEEE
14 years 2 months ago
Towards an integrated modeling and simulation framework for freight transportation in metropolitan areas
Freight transportation at distribution nodes such as marine ports, airports and rail yards has been putting tremendous environmental pressure in metropolitan areas. A prerequisite...
Qunzhi Zhou, Amol Bakshi, Viktor K. Prasanna, Rama...