Sciweavers

113 search results - page 20 / 23
» Requirements-Related Risks in Critical Systems
Sort
View
CSREASAM
2009
13 years 8 months ago
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process
Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, i...
Michael R. Grimaila, Larry Fortson, Janet Sutton
EAAI
2008
128views more  EAAI 2008»
13 years 7 months ago
Dual heuristic programming based nonlinear optimal control for a synchronous generator
This paper presents the design of an infinite horizon nonlinear optimal neurocontroller that replaces the conventional automatic voltage regulator and the turbine governor (CONVC)...
Jung-Wook Park, Ronald G. Harley, Ganesh K. Venaya...
RE
2010
Springer
13 years 6 months ago
Assessing traceability of software engineering artifacts
Abstract The generation of traceability links or traceability matrices is vital to many software engineering activities. It is also person-power intensive, time-consuming, error-pr...
Senthil Karthikeyan Sundaram, Jane Huffman Hayes, ...
WORDS
2005
IEEE
14 years 1 months ago
A Framework for Preparing Experimental Evaluation of Rerouting Mechanisms
Since the deployment of real-time sensitive applications in the Internet, the research community has been struggling to leverage the IP best-effort networks for providing QoS assu...
Reinaldo de Barros Correia, Luiz F. Rust da Costa ...
ICSE
2000
IEEE-ACM
13 years 11 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine