Sciweavers

410 search results - page 14 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
ICSEA
2008
IEEE
14 years 2 months ago
Analyzing Software Evolvability of an Industrial Automation Control System: A Case Study
Evolution of software systems is characterized by inevitable changes of software and increasing software complexity, which in turn may lead to huge maintenance and development cos...
Hongyu Pei Breivold, Ivica Crnkovic, Rikard Land, ...
PAM
2007
Springer
14 years 1 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
IROS
2007
IEEE
162views Robotics» more  IROS 2007»
14 years 1 months ago
Comparative evaluation of robotic software integration systems: A case study
— One might expect that after nearly 50 years of research in robot manipulation and mobile robotics the architectural design of robot systems has converged to a small set of best...
Azamat Shakhimardanov, Erwin Prassler
VTS
2007
IEEE
116views Hardware» more  VTS 2007»
14 years 1 months ago
Case Study: Soft Error Rate Analysis in Storage Systems
Soft errors due to cosmic particles are a growing reliability threat for VLSI systems. In this paper we analyze the soft error vulnerability of FPGAs used in storage systems. Sinc...
Brian Mullins, Hossein Asadi, Mehdi Baradaran Taho...
RE
2004
Springer
14 years 29 days ago
Quantifying Non-Functional Requirements: A Process Oriented Approach
In this work, we propose a framework for quantifying non-functional requirements (NFRs). This framework uses quality characteristics of the execution domain, application domain an...
Raquel L. Hill, Jun Wang, Klara Nahrstedt