Sciweavers

1051 search results - page 83 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
ASWEC
2006
IEEE
14 years 3 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
ICSE
2008
IEEE-ACM
14 years 9 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
WORM
2004
13 years 10 months ago
Preliminary results using scale-down to explore worm dynamics
A major challenge when attempting to analyze and model large-scale Internet phenomena such as the dynamics of global worm propagation is finding ate abstractions that allow us to ...
Nicholas Weaver, Ihab Hamadeh, George Kesidis, Ver...
ESEM
2007
ACM
14 years 24 days ago
Proposal of a Complete Life Cycle In-Process Measurement Model Based on Evaluation of an In-Process Measurement Experiment Using
This paper focuses on in-process measurements during requirements definition where measurements of processes and products are relatively difficult. However, development processes ...
Yoshiki Mitani, Tomoko Matsumura, Mike Barker, Sei...
VAMOS
2009
Springer
14 years 3 months ago
Some Challenges of Feature-based Merging of Class Diagrams
In software product line engineering, feature models enable to automate the generation of productspecific models in conjunction with domain “base models” (e.g. UML models). T...
Germain Saval, Jorge Pinna Puissant, Patrick Heyma...