Sciweavers

410 search results - page 10 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
CCS
2003
ACM
14 years 25 days ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
ISESE
2005
IEEE
14 years 1 months ago
Integrating agile software development and software process improvement: a longitudinal case study
Agile software development solutions are targeted at enhancing work at project level. Little is yet known about the relationship between agile projects and organizational capabili...
Outi Salo, Pekka Abrahamsson
MR
2007
157views Robotics» more  MR 2007»
13 years 7 months ago
Electronic prognostics - A case study using global positioning system (GPS)
– Prognostic health management (PHM) of electronic systems presents challenges traditionally viewed as either insurmountable or otherwise not worth the cost of pursuit. Recent ch...
Douglas W. Brown, Patrick W. Kalgren, Carl S. Byin...
OOPSLA
2005
Springer
14 years 1 months ago
Removing duplication from java.io: a case study using traits
Code duplication is a serious problem with no easy solution, even in industrial-strength code. Single inheritance cannot provide for effective code reuse in all situations, and s...
Emerson R. Murphy-Hill, Philip J. Quitslund, Andre...
EUROPKI
2009
Springer
13 years 5 months ago
Validity Models of Electronic Signatures and Their Enforcement in Practice
Abstract. An electronic signature is considered to be valid, if the signature is mathematically correct and if the signer's public key is classified as authentic. While the fi...
Harald Baier, Vangelis Karatsiolis