Sciweavers

2838 search results - page 144 / 568
» Verifying Controlled Components
Sort
View
ECMDAFA
2005
Springer
130views Hardware» more  ECMDAFA 2005»
14 years 3 months ago
Control Flow Analysis of UML 2.0 Sequence Diagrams
This article presents a control flow analysis methodology based on UML 2.0 sequence diagrams (SD). In contrast to the conventional code-based control flow analysis techniques, thi...
Vahid Garousi, Lionel C. Briand, Yvan Labiche
FOSSACS
2012
Springer
12 years 6 months ago
Synthesizing Probabilistic Composers
Synthesis from components is the automated construction of a composite system from a library of reusable components such that the system satisfies the given specification. This i...
Sumit Nain, Moshe Y. Vardi
SACMAT
2005
ACM
14 years 3 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
SACMAT
2009
ACM
14 years 4 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
TPDS
2002
141views more  TPDS 2002»
13 years 10 months ago
Integration of Pricing with Call Admission Control to Meet QoS Requirements in Cellular Networks
Call Admission Control (CAC) plays a significant role in providing the desired Quality of Service (QoS) in cellular networks. Traditional CAC schemes that mainly focus on the trade...
Jiongkuan Hou, Jie Yang, Symeon Papavassiliou