Sciweavers

2624 search results - page 26 / 525
» The 2LIP model and its implementations
Sort
View
KBSE
2007
IEEE
14 years 1 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
WOTUG
2008
13 years 9 months ago
Representation and Implementation of CSP and VCR Traces
Abstract. Communicating Sequential Processes (CSP) was developed around a formal algebra of processes and a semantics based on traces (and failures and divergences). A trace is a r...
Neil C. C. Brown, Marc L. Smith
HICSS
2003
IEEE
179views Biometrics» more  HICSS 2003»
14 years 28 days ago
A QoS Metamodel and its Realization in a CORBA Component Infrastructure
This paper presents a generic model driven approach to enable Quality of Service (QoS) modeling and realization for component based middleware platforms. We describe a QoS metamod...
Tom Ritter, Marc Born, Thomas Unterschütz, To...
HICSS
2008
IEEE
164views Biometrics» more  HICSS 2008»
14 years 2 months ago
Analysing the Relationship between IT Governance and Business/IT Alignment Maturity
IT governance is one of these concepts that suddenly emerged and became an important issue in the information technology area. Some organisations started with the implementation o...
Steven De Haes, Wim Van Grembergen
OPODIS
2010
13 years 5 months ago
On the Automated Implementation of Time-Based Paxos Using the IOA Compiler
Paxos is a well known algorithm for achieving consensus in distributed environments with uncertain processing and communication timing. Implementations of its variants have been s...
Chryssis Georgiou, Procopis Hadjiprocopiou, Peter ...