Sciweavers

410 search results - page 54 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
MCS
2008
Springer
13 years 7 months ago
Parameter identification and model verification in systems of partial differential equations applied to transdermal drug deliver
The purpose of this paper is to present some numerical tools which facilitate the interpretation of simulation or data fitting results and which allow to compute optimal experimen...
Klaus Schittkowski
ICSM
2002
IEEE
14 years 20 days ago
A Technique for Dynamic Updating of Java Software
During maintenance, systems are updated to correct faults, improve functionality, and adapt the software to changes in its execution environment. The typical softwareupdate proces...
Alessandro Orso, Anup Rao, Mary Jean Harrold
ICSOC
2007
Springer
14 years 1 months ago
Negotiation of Service Level Agreements: An Architecture and a Search-Based Approach
Software systems built by composing existing services are more and more capturing the interest of researchers and practitioners. The envisaged long term scenario is that services, ...
Elisabetta Di Nitto, Massimiliano Di Penta, Alessi...
WECWIS
2003
IEEE
125views ECommerce» more  WECWIS 2003»
14 years 1 months ago
A Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
Seokwon Yang, Stanley Y. W. Su, Herman Lam
POLICY
2004
Springer
14 years 1 months ago
Policy Based Management for Internet Communities
Policy Based Management (PBM) is a research topic that has been driven by the tremendous complexity inherent in the administration and management of present-day networking and tel...
Kevin Chekov Feeney, David Lewis, Vincent P. Wade