Sciweavers

674 search results - page 124 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
JCIT
2010
146views more  JCIT 2010»
13 years 2 months ago
Determing Performance of Choreography-based Composite Services
Web Service Choreography Description Language is a main-stream standard for the description of peer-to-peer collaborations for the participants for service composition. To predict...
Yunni Xia, Zhe Ouyang, Yanxin Wu, Ruilong Yang
KBSE
2008
IEEE
14 years 2 months ago
Random Test Run Length and Effectiveness
Abstract—A poorly understood but important factor in random testing is the selection of a maximum length for test runs. Given a limited time for testing, it is seldom clear wheth...
James H. Andrews, Alex Groce, Melissa Weston, Ru-G...
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 2 months ago
FP/FIFO Scheduling: Deterministic Versus Probabilistic QoS Guarantees and P-Schedulability
Abstract—In this paper, we focus on applications with quantitative QoS (Quality of Service) requirements in their end-toend response time. Two types of quantitative QoS garantees...
Leïla Azouz Saïdane, Skander Azzaz, Stev...
TCGOV
2005
Springer
14 years 1 months ago
UNICAP: Efficient Decision Support for Academic Resource and Capacity Management
Growing complexity of the data and processes to be managed, as well as the transition from strict governmental regulation towards autonomy make academic institutions a significant ...
Svetlana Vinnik, Marc H. Scholl
DFG
2004
Springer
14 years 1 months ago
An Engineer's Workstation to Support Integrated Development of Flexible Production Control Systems
Abstract. Today's manufacturing industry demands flexible and decentralized production control systems to avoid hours of down time of the production line in case of a failure ...
Wilhelm Schäfer, Robert Wagner, Jürgen G...