Sciweavers

535 search results - page 89 / 107
» Research on Support Tools for Object-Oriented Software Reeng...
Sort
View
FASE
2008
Springer
13 years 10 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
DEXAW
2002
IEEE
96views Database» more  DEXAW 2002»
14 years 1 months ago
Individual Knowledge Management with MailTack
We present our EU-sponsored research in the domain of individual knowledge management and collaborative learning: the MailTack system. MailTack is a stand-alone software tool that...
Marco C. Bettoni, Robert Ottiger, Rolf Todesco, Ku...
ECIS
2003
13 years 10 months ago
A multi-model algorithm for the cost-oriented design of the information technology infrastructure
Multiple combinations of hardware and network components can be selected to design an information technology (IT) infrastructure that satisfies performance requirements. The profe...
Danilo Ardagna, Chiara Francalanci, Marco Trubian
ICMCS
2007
IEEE
128views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Interactive Search of Adipocytes in Large Collections of Digital Cellular Images
In the field of lipid research, the measurement of adipocyte size is an important but difficult problem. We describe an imaging-based solution that combines precise investigator...
Adam Goode, Mei Chen, Anil Tarachandani, Lily B. M...
JSAC
2011
108views more  JSAC 2011»
13 years 3 months ago
A Model-Based Approach to Cognitive Radio Design
Abstract—Cognitive radio is a promising technology for fulfilling the spectrum and service requirements of future wireless communication systems. Real experimentation is a key f...
Jorg Lotze, Suhaib A. Fahmy, Juanjo Noguera, Linda...