Sciweavers

378 search results - page 55 / 76
» Security requirement analysis of business processes
Sort
View
SAFECOMP
2007
Springer
14 years 1 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...
WOSP
2005
ACM
14 years 1 months ago
Performance by unified model analysis (PUMA)
Evaluation of non-functional properties of a design (such as performance, dependability, security, etc.) can be enabled by design annotations specific to the property to be evalua...
C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan...
ESOP
2005
Springer
14 years 1 months ago
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus
Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of imp...
Steve Kremer, Mark Ryan
TCSV
2008
189views more  TCSV 2008»
13 years 7 months ago
Machine Recognition of Human Activities: A Survey
The past decade has witnessed a rapid proliferation of video cameras in all walks of life and has resulted in a tremendous explosion of video content. Several applications such as ...
Pavan K. Turaga, Rama Chellappa, V. S. Subrahmania...
CASCON
2003
116views Education» more  CASCON 2003»
13 years 9 months ago
Workload characterization for an E-commerce web site
Electronic commerce servers have a significant presence in today’s Internet. Corporations require good performance for their business processes. To date, little empirical evide...
Qing Wang, Dwight J. Makaroff, H. Keith Edwards, R...