Sciweavers

2763 search results - page 64 / 553
» The Dangerous 'All' in Specifications
Sort
View
INFORMATICALT
2006
75views more  INFORMATICALT 2006»
13 years 9 months ago
Repository for Business Rules Based IS Requirements
The quality of software engineering projects often suffers due to the large gap between the way stakeholders present their requirements and the way analysts capture and express tho...
Kestutis Kapocius, Rimantas Butleris
SYNTHESE
2008
84views more  SYNTHESE 2008»
13 years 9 months ago
Model structure adequacy analysis: selecting models on the basis of their ability to answer scientific questions
Models carry the meaning of science. This puts a tremendous burden on the process of model selection. In general practice, models are selected on the basis of their relative goodne...
Mark L. Taper, David F. Staples, Bradley B. Shepar...
CORR
2000
Springer
87views Education» more  CORR 2000»
13 years 9 months ago
Security Policy Consistency
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira, Pau...
GLOBECOM
2010
IEEE
13 years 7 months ago
Multicasting vs. Broadcasting: What Are the Trade-Offs?
Network-wide broadcasting and multicasting are two important routing schemes used in group communications. In network-wide broadcasting, generated packets at the source node are di...
Bora Karaoglu, Wendi Rabiner Heinzelman
FASE
2009
Springer
14 years 1 months ago
Certification of Smart-Card Applications in Common Criteria
This paper describes the certification of smart-card applications in the framework of Common Criteria. In this framework, a smart-card application is represented by a model of its...
Iman Narasamdya, Michaël Périn