Sciweavers

1460 search results - page 48 / 292
» Very Lightweight Requirements Modeling
Sort
View
JSCIC
2010
61views more  JSCIC 2010»
13 years 4 months ago
Modeling the Early Ionization of Dielectrics by Ultrashort Laser Pulses
In this paper, we present a model for propagation of intense and ultrashort laser pulses ionizing dielectrics. We consider early ionization so that this process is sufficiently we...
Antoine Bourgeade, Candice Mézel, Olivier S...
GLOBECOM
2008
IEEE
14 years 4 months ago
A Theoretical Model of the Effects of Losses and Delays on the Performance of SIP
—The Session Initiation Protocol (SIP) is widely used for VoIP communication. Losses caused by network or server overload would cause retransmissions and delays in the session es...
Dorgham Sisalem, Mikkel Liisberg, Yacine Rebahi
CAISE
2009
Springer
14 years 2 months ago
Goal-Directed Modeling of Self-adaptive Software Architecture
Abstract. Today’s large-scale computing systems are deployed in open, changing and unpredictable environments. To operate reliably, such systems should be able to adapt to new ci...
Shan Tang, Xin Peng, Yijun Yu, Wenyun Zhao
SUTC
2008
IEEE
14 years 4 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
RBAC
1997
234views more  RBAC 1997»
13 years 11 months ago
Comparing simple role based access control models and access control lists
The RBAC metaphor is powerful in its ability to express access control policy in terms of the way in which administrators view organizations. The functionality of simple Role Base...
John F. Barkley