Sciweavers

326 search results - page 19 / 66
» Tailoring and Verifying Software Process
Sort
View
ETFA
2005
IEEE
14 years 2 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
INFSOF
2002
108views more  INFSOF 2002»
13 years 8 months ago
Architectural styles for distributed processing systems and practical selection method
The software architecture of a system has influences against various software characteristics of the system such as efficiency, reliability, maintainability, and etc.. For support...
Yoshitomi Morisawa, Katsuro Inoue, Koji Torii
CORR
2008
Springer
154views Education» more  CORR 2008»
13 years 8 months ago
A Counterexample Guided Abstraction-Refinement Framework for Markov Decision Processes
rexample Guided Abstraction-Refinement Framework for Markov Decision Processes ROHIT CHADHA and MAHESH VISWANATHAN Dept. of Computer Science, University of Illinois at Urbana-Champ...
Rohit Chadha, Mahesh Viswanathan
EWSPT
1995
Springer
14 years 21 hour ago
Process Modelling Languages: One or Many?
The paper describes the different phases and subdomains of process modelling and their needs for conceptual and linguistic support, and in what forms. We group the relevant factor...
Reidar Conradi, Chunnian Liu
SRDS
2007
IEEE
14 years 2 months ago
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. ...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao