Sciweavers

1737 search results - page 305 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
WOSP
2005
ACM
14 years 3 months ago
From UML to LQN by XML algebra-based model transformations
The change of focus from code to models promoted by OMG's Model Driven Development raises the need for verification of nonfunctional characteristics of UML models, such as pe...
Gordon Ping Gu, Dorina C. Petriu
NOMS
1998
IEEE
160views Communications» more  NOMS 1998»
14 years 2 months ago
SP-to-SP service ordering specification and its implementation
Network Management Forum (NMF) has defined a set of basic business processes dealing with major TMN service management functions such as performance management, fault management, b...
Graham Chen, Qinzheng Kong, Pierre-Yves Benain
CBMS
2008
IEEE
14 years 4 months ago
Restoring the Patient Control over Her Medical History
Paper-based folders have been widely used to coordinate cares in medical-social networks, but they introduce some burning issues (e.g. privacy protection, remote access to the fol...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, K&ea...
FCT
2009
Springer
14 years 4 months ago
Competitive Group Testing and Learning Hidden Vertex Covers with Minimum Adaptivity
Suppose that we are given a set of n elements d of which are “defective”. A group test can check for any subset, called a pool, whether it contains a defective. It is well know...
Peter Damaschke, Azam Sheikh Muhammad
IPPS
1997
IEEE
14 years 2 months ago
A Tool for On-line Visualization and Interactive Steering of Parallel HPC Applications
Tools for parallel systems today range from specification over debugging to performance analysis and more. Typically, they help the programmers of parallel algorithms from the ea...
Sabine Rathmayer