Sciweavers

209 search results - page 33 / 42
» Towards a Systematic Development of Secure Systems
Sort
View
ICSE
2008
IEEE-ACM
14 years 8 months ago
The international workshop on software architectures and mobility (SAM 2008)
E-businesses are increasingly facing the need of porting the provision of their e-services to mobile customers. Evolving requirements, such as reliability, security, scalability, ...
Licia Capra, Rami Bahsoon, Wolfgang Emmerich, Moha...
ISER
2004
Springer
117views Robotics» more  ISER 2004»
14 years 2 months ago
Synthesis and Analysis of Non-Reactive Controllers for Multi-Robot Sequential Task Domains
In this paper we present a macroscopic model for the analysis of homogeneous task-directed multi-robot systems (MRS). The model is used to compute the probability that a given MRS ...
Chris Jones, Maja J. Mataric
USS
2010
13 years 6 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
ISI
2004
Springer
14 years 2 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia
OOPSLA
2000
Springer
14 years 6 days ago
A real world object modeling method for creating simulation environment of real-time systems
Most real-time embedded control software feature complex interactions with asynchronous inputs and environment objects, and a meaningful simulation of a real-time control software...
Ji Y. Lee, Hye J. Kim, Kyo Chul Kang