Sciweavers

2403 search results - page 77 / 481
» Using the WinWin Spiral Model: A Case Study
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
14 years 11 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
VISUALIZATION
2000
IEEE
15 years 9 months ago
A computational steering system for studying microwave interactions with missile bodies
This paper describes a computer modeling and simulation system that supports computational steering, which is an effort to make the typical simulation workflow more efficient. O...
J. Edward Swan II, Marco Lanzagorta, Doug Maxwell,...
DKE
2011
260views Education» more  DKE 2011»
14 years 8 months ago
Analysis on demand: Instantaneous soundness checking of industrial business process models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications, and...
Dirk Fahland, Cédric Favre, Jana Koehler, N...
QEST
2008
IEEE
15 years 11 months ago
Debugging of Dependability Models Using Interactive Visualization of Counterexamples
Abstract—We present an approach to support the debugging of stochastic system models using interactive visualization. The goal of this work is to facilitate the identification o...
Husain Aljazzar, Stefan Leue
SPLC
2008
15 years 6 months ago
An Exploratory Study of Information Retrieval Techniques in Domain Analysis
Domain analysis involves not only looking at standard requirements documents (e.g., use case specifications) but also at customer information packs, market analyses, etc. Looking ...
Vander Alves, Christa Schwanninger, Luciano Barbos...