Sciweavers

1221 search results - page 151 / 245
» Integrating Business and Software Development Models
Sort
View
ISCA
1999
IEEE
187views Hardware» more  ISCA 1999»
14 years 13 days ago
Area Efficient Architectures for Information Integrity in Cache Memories
Information integrity in cache memories is a fundamental requirement for dependable computing. Conventional architectures for enhancing cache reliability using check codes make it...
Seongwoo Kim, Arun K. Somani
ICDCS
1996
IEEE
14 years 9 days ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...
MODELLIERUNG
2001
13 years 9 months ago
Dependency Charts as a Means to Model Inter-Scenario Dependencies
: Scenarios/use cases have gained wide-spread use over the last couple of years. In software engineering they are mainly used to capture requirements and specify a system. Many sof...
Johannes Ryser, Martin Glinz
FASE
2004
Springer
14 years 1 months ago
Modeling Role-Based Access Control Using Parameterized UML Models
Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...
RE
2005
Springer
14 years 1 months ago
Model-Driven Visual Requirements Engineering
This paper describes the requirements handling process of a set of research projects, the ATHENA IP, and how this process is supported by modeling and visualizing requirement stru...
Helge Grenager Solheim, Frank M. Lillehagen, Sobah...