Sciweavers

410 search results - page 61 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
ENTCS
2002
107views more  ENTCS 2002»
13 years 8 months ago
Monitoring, Checking, and Steering of Real-Time Systems
The MaC system has been developed to provide assurance that a target program is running correctly with respect to formal requirements specification. This is achieved by monitoring...
Moonjoo Kim, Insup Lee, Usa Sammapun, Jangwoo Shin...
RE
2008
Springer
13 years 8 months ago
Sensitivity analysis in the process of COTS mismatch-handling
Abstract During the selection of commercial off-theshelf (COTS) products, mismatches encountered between stakeholders' requirements and features offered by COTS products are i...
Abdallah Mohamed, Günther Ruhe, Armin Eberlei...
JSAC
2011
150views more  JSAC 2011»
13 years 3 months ago
Probabilistic Delay Control and Road Side Unit Placement for Vehicular Ad Hoc Networks with Disrupted Connectivity
—This paper studies the multihop packet delivery delay in a low density vehicular ad hoc network (VANET). We address a disrupted vehicle-to-infrastructure communication scenario,...
Atef Abdrabou, Weihua Zhuang
XMLSEC
2003
ACM
14 years 2 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
MICCAI
2000
Springer
14 years 16 days ago
Intraoperative Segmentation and Nonrigid Registration for Image Guided Therapy
Our goal was to improve image guidance during minimally invasive image guided therapy by developing an intraoperative segmentation and nonrigid registration algorithm. The algorith...
Simon K. Warfield, Arya Nabavi, Torsten Butz, Kema...