Sciweavers

1801 search results - page 254 / 361
» Implementation-Oriented Secure Architectures
Sort
View
137
Voted
RE
2004
Springer
15 years 9 months ago
Quantifying Non-Functional Requirements: A Process Oriented Approach
In this work, we propose a framework for quantifying non-functional requirements (NFRs). This framework uses quality characteristics of the execution domain, application domain an...
Raquel L. Hill, Jun Wang, Klara Nahrstedt
125
Voted
ISI
2003
Springer
15 years 8 months ago
PROGENIE: Biographical Descriptions for Intelligence Analysis
Intelligence analysts face the need for immediate, up-to-date information about individuals of interest. While biographies can be written and stored in text databases, we argue tha...
Pablo Ariel Duboué, Kathleen McKeown, Vasil...
139
Voted
HOTOS
1997
IEEE
15 years 7 months ago
Operating Systems for Component Software Environments
Although component software has emerged as one of the most significant and commercially successful technologies of the past few years, few operating systems are designed to host a...
Noah Mendelsohn
116
Voted
ICICS
1997
Springer
15 years 7 months ago
Enforcing traceability in software
Traceability is a property of a communications protocol that ensures that the origin and/or destination of messages can be identified. The aims of this paper are twofold. Firstly t...
Colin Boyd
133
Voted
COMPCON
1994
IEEE
15 years 7 months ago
An Overview of the Spring System
Spring is a highly modular, distributed, object-oriented operating system. This paper describes the goals of the Spring system and provides overviews of the Spring object model, t...
James G. Mitchell, Jonathan Gibbons, Graham Hamilt...