Sciweavers

674 search results - page 100 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
MM
2005
ACM
371views Multimedia» more  MM 2005»
14 years 2 months ago
Data grid for large-scale medical image archive and analysis
Storage and retrieval technology for large-scale medical image systems has matured significantly during the past ten years but many implementations still lack cost-effective backu...
H. K. Huang, Aifeng Zhang, Brent J. Liu, Zheng Zho...
AAMAS
2004
Springer
13 years 9 months ago
Tropos: An Agent-Oriented Software Development Methodology
Our goal in this paper is to introduce and motivate a methodology, called Tropos,1 for building agent oriented software systems. Tropos is based on two key ideas. First, the notion...
Paolo Bresciani, Anna Perini, Paolo Giorgini, Faus...
ACSC
2010
IEEE
13 years 4 months ago
Efficient contour line labelling for terrain modelling
Terrains are an essential part of outdoor environments. Terrain models are important for computer games and applications in architecture, urban design and archaeology. A popular a...
Xin Xie, Burkhard Wünsche
SNPD
2008
13 years 10 months ago
Testing Component-Based Real Time Systems
This paper focuses on studying efficient solutions for modeling and deriving compositional tests for component-based real-time systems. In this work, we propose a coherent framewo...
Rachid Bouaziz, Ismail Berrada
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 7 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig