Sciweavers

113 search results - page 15 / 23
» Requirements-Related Risks in Critical Systems
Sort
View
IEEEARES
2007
IEEE
14 years 1 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...
EOR
2010
87views more  EOR 2010»
13 years 7 months ago
Inventory systems with stochastic demand and supply: Properties and approximations
ic copy available at: http://ssrn.com/abstract=1115410 Inventory Systems with Stochastic Demand and Supply: Properties and Approximations Amanda J. Schmitt Center for Transportatio...
Amanda J. Schmitt, Lawrence V. Snyder, Zuo-Jun Max...
AUTOMATICA
2006
101views more  AUTOMATICA 2006»
13 years 7 months ago
A risk-sensitive approach to total productive maintenance
While risk-sensitive (RS) approaches for designing plans of total productive maintenance are critical in manufacturing systems, there is little in the literature by way of theoret...
Abhijit Gosavi
JCS
2002
115views more  JCS 2002»
13 years 7 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
EMSOFT
2011
Springer
12 years 7 months ago
Software certification: coding, code, and coders
We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. T...
Klaus Havelund, Gerard J. Holzmann