With the rapid replacement of closed, homogeneous, proprietary HPC systems by heterogeneous, Linux-MPI cluster systems, the state of performance monitoring and analysis tools has ...
When having repeated interactions with a service provider, a service consumer might desire guarantees on the delivery of the service. These guarantees involve both functional and n...
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
This paper describes the use of Obstacle Analysis to identify anomaly handling requirements for a safety-critical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Ann Patterson-Hine, Stacy Nelson, C...
Abstract. Wireless Sensor Networks (WSN) have been studied intensively for various applications such as monitoring and surveillance. Sensor deployment is an essential part of WSN, ...
Vahab Akbarzadeh, Albert Hung-Ren Ko, Christian Ga...