Sciweavers

4250 search results - page 125 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
ICAIL
2007
ACM
14 years 1 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
AGTIVE
2007
Springer
14 years 1 months ago
Transforming Timeline Specifications into Automata for Runtime Monitoring
Abstract. In runtime monitoring, a programmer specifies code to execute whenever a sequence of events occurs during program execution. Previous and related work has shown that runt...
Eric Bodden, Hans Vangheluwe
PEWASUN
2005
ACM
14 years 2 months ago
Investigating unfairness scenarios in MANET using 802.11b
An experimental study of MANET using 802.11b has shown that there exist several configurations where this standard does not guarantee fairness for the channel access. In this pap...
Leïla Kloul, Fabrice Valois
BMCBI
2010
154views more  BMCBI 2010»
13 years 9 months ago
An eScience-Bayes strategy for analyzing omics data
Background: The omics fields promise to revolutionize our understanding of biology and biomedicine. However, their potential is compromised by the challenge to analyze the huge da...
Martin Eklund, Ola Spjuth, Jarl E. S. Wikberg
COMPSAC
2004
IEEE
14 years 27 days ago
Implementing Hierarchical Features in a Graphically Based Formal Modelling Language
Many developers who could benefit from building and analysing formal models of their systems are deterred from doing so by the process algebra style input languages of formal mode...
Peter Henderson, Robert John Walters, Stephen Crou...