Sciweavers

259 search results - page 39 / 52
» Model-based Generation of a Requirements Monitor
Sort
View
COMPSAC
2010
IEEE
13 years 5 months ago
Using Load Tests to Automatically Compare the Subsystems of a Large Enterprise System
Enterprise systems are load tested for every added feature, software updates and periodic maintenance to ensure that the performance demands on system quality, availability and res...
Haroon Malik, Bram Adams, Ahmed E. Hassan, Parmind...
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 2 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
GCC
2004
Springer
14 years 28 days ago
Engineering Process Coordination Based on a Service Event Notification Model
Abstract. Due to the complexity and uncertainties, the engineering process requires dynamic collaborations among the heterogeneous systems and human interactions. In this paper, we...
Jian Cao, Jie Wang, Shen-sheng Zhang, Minglu Li, K...
DLOG
1996
13 years 8 months ago
A Translation Scheme for Domain Ontologies Based on Model Ontologies of KBS
To ensure the re-use of domain ontologies the usual approach relies on a pivot language, e.g., Kif, intoandfromwhich the domainontologyis translated. This requires several distinc...
Houria Mihoubi, Ana Simonet, Michel Simonet
SAC
2010
ACM
14 years 26 days ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper