Sciweavers

19003 search results - page 89 / 3801
» We Need Assurance!
Sort
View
ER
2007
Springer
106views Database» more  ER 2007»
14 years 2 months ago
Extending Argumentation to Goal-Oriented Requirements Engineering
A key goal in safety-critical system development is to provide assurance that the critical requirements are sufficiently addressed. This goal is typically refined into three sub-go...
Ibrahim Habli, Weihang Wu, Katrina Attwood, Tim Ke...
ICMCS
2005
IEEE
92views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Exploiting Limited Upstream Bandwidth in Peer-to-Peer Streaming
In this paper, we propose a hybrid architecture to integrate Peer-to-Peer (P2P) streaming approaches with content distribution networks (CDNs). We further utilize Multiple Descrip...
Yingfei Dong, Ewa Kusmierek, Zhenhai Duan
ADAEUROPE
2010
Springer
14 years 21 days ago
Practical Limits on Software Dependability: A Case Study
The technology for building dependable computing systems has advanced dramatically. Nevertheless, there is still no complete solution to building software for critical systems in w...
Patrick J. Graydon, John C. Knight, Xiang Yin
VLDB
2007
ACM
115views Database» more  VLDB 2007»
14 years 8 months ago
NS2: Networked Searchable Store with Correctness
In an outsourced data framework, we introduce and demonstrate mechanisms for securely storing a set of data items (documents) on an un-trusted server, while allowing for subsequen...
Radu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan K...
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
14 years 1 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...