Sciweavers

263 search results - page 5 / 53
» System design methodologies for a wireless security processi...
Sort
View
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
14 years 1 days ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
IEEEARES
2007
IEEE
14 years 1 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...
DT
2006
180views more  DT 2006»
13 years 7 months ago
A SystemC Refinement Methodology for Embedded Software
process: Designers must define higher abstraction levels that allow system modeling. They must use description languages that handle both hardware and software components to descri...
Jérôme Chevalier, Maxime de Nanclas, ...
AOSE
2004
Springer
14 years 24 days ago
Bridging the Gap Between Agent-Oriented Design and Implementation Using MDA
Current agent-oriented methodologies focus mainly on multi-agent systems analysis and design, but without providing straightforward connections to the implementation of such system...
Mercedes Amor, Lidia Fuentes, Antonio Vallecillo
GECCO
2007
Springer
159views Optimization» more  GECCO 2007»
14 years 1 months ago
A systemic computation platform for the modelling and analysis of processes with natural characteristics
Computation in biology and in conventional computer architectures seem to share some features, yet many of their important characteristics are very different. To address this, [1]...
Erwan Le Martelot, Peter J. Bentley, R. Beau Lotto