Sciweavers

674 search results - page 74 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
CODES
2007
IEEE
14 years 4 months ago
Complex task activation schemes in system level performance analysis
The design and analysis of today’s complex real-time systems requires advanced methods. Due to ever growing functionality, hardware complexity and component interaction, applyin...
Wolfgang Haid, Lothar Thiele
AUSAI
1997
Springer
14 years 2 months ago
Evaluating a Qualitative Reasoner
In order to support verification, validation and analysis of dynamic Operations Research (OR) models a method of testing models against data is required. In the case of the QCM qu...
Sam Waugh, Tim Menzies, Simon Goss
ICSE
2003
IEEE-ACM
14 years 10 months ago
Using Process Technology to Control and Coordinate Software Adaptation
We have developed an infrastructure for end-to-end run-time monitoring, behavior/performance analysis, and dynamic adaptation of distributed software. This infrastructure is prima...
Giuseppe Valetto, Gail E. Kaiser
IFIP
2009
Springer
14 years 4 months ago
Static Detection of Logic Flaws in Service-Oriented Applications
Application or business logic, used in the development of services, has to do with the operations that define the application functionalities and not with the platform ones. Often...
Chiara Bodei, Linda Brodo, Roberto Bruni
SIGIR
2002
ACM
13 years 10 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny