Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   16  
      Earth SciencesClimate ChangeWater qualityBiological Sciences
    • by 
    •   10  
      Computer ScienceSoftware DevelopmentSecurity EngineeringComputer Software
    • by 
    •   6  
      Software DevelopmentSecurity RequirementsCase StudyRequirement Engineering
    • by 
    •   8  
      Software DevelopmentSecurity EngineeringComputer SoftwareSecurity Requirements
Security facilities of information systems with high security requirements should be consistently and continuously developed, used, and maintained based on some common standards of information security. However, there is no engineering... more
    • by 
    •   15  
      Information SystemsComputer ScienceManagement Information SystemsInformation Security
    • by 
    •   7  
      Project ManagementExperimental DesignSelection CriteriaExperimental Designs
    • by  and +2
    •   12  
      Cultural HeritageEnvironmental Impact AssessmentSocial impactEnvironmental Sciences
This paper presents a comparative assessment based on time response specification performance between modern and intelligent controller for a pitch control system of an aircraft system. The dynamic modeling of pitch control system is... more
    • by 
    •   16  
      Fuzzy LogicIntelligent ControlVehicle DynamicsFuzzy Control
    • by 
    •   11  
      Information SystemsInformation SecurityRequirements EngineeringSecurity Engineering
    • by 
    •   12  
      Distributed ComputingWireless CommunicationsComputer NetworksProtocol Design
    • by 
    •   4  
      Electronic VotingElectronicSecurity RequirementsCommon Criteria
    • by 
    •   5  
      OPERATING SYSTEMFormal VerificationSecurity PolicySystem Sciences
A questionnaire was sent to 1500 randomly selected dairy herds in Sweden, asking for general information about the herds, including routines from birth to first calving and also routines at breeding, calving and during the grazing period.... more
    • by 
    •   16  
      BreedingAnimal ProductionAnimal HusbandrySweden
    • by 
    •   5  
      Software EngineeringInformation SecuritySecurityComputer Security
    • by 
    •   12  
      Information SystemsRequirements EngineeringSecurity EngineeringComputer Software
Component-based software engineering (CBSE) endeavors to enable software developers to develop quality software systems with less time and resources than traditional development approaches. Software components must be identified and... more
    • by 
    •   13  
      EngineeringComputer ScienceSoftware DevelopmentComponent Based Software Development
    • by  and +2
    •   15  
      Environmental MonitoringDistributed Estimation (Wireless Sensor Network)Quality Controlcomputer Integrated manufacturing
The performance of a distributed system is affected by the various functions of its components. The interaction between components such as network nodes, computer systems and system programs is examined with special interest accorded to... more
    • by 
    •   87  
      EngineeringTechnologyArchitectureGovernment
    • by  and +1
    •   4  
      Information SystemsProcess ImprovementCapability Maturity ModelCommon Criteria
This article outlines the challenges of IP multicast over Mobile IP. Then it provides a comprehensive overview of existing multicast solutions to handle mobile sources and receivers in both the Mobile IPv4 and the Mobile IPv6... more
    • by 
    •   8  
      Computer ArchitectureDistributed ComputingMobile IPProtocols
    • by 
    •   14  
      Game TheoryNash EquilibriumProduct DistributionCommon Criteria
    • by 
    •   14  
      StentsHumansStandardisationDifferential Diagnosis
    • by 
    •   4  
      MultidisciplinaryNatureEducation SystemCommon Criteria
    • by 
    •   6  
      EngineeringTechnologyComputer NetworksMobile phone
    • by 
    •   13  
      MARINE POLLUTIONEuropean UnionEnvironmental MonitoringMultidisciplinary
    • by 
    •   3  
      Software DevelopmentSecurity RequirementsCommon Criteria
    • by 
    •   15  
      Decision MakingRisk assessmentInformation Systems SecuritySecurity Requirements
Social media enhanced learning systems bring new challenges to evaluate learning environments. Many features are common with any web-based services and can be evaluated with common criteria. But with social media services users can also... more
    • by 
    •   19  
      Educational TechnologyEngineering EducationHigher EducationPrivacy
    • by 
    •   9  
      Resource LimitationCost effectivenessBusiness ProcessDenial of Service
    • by 
    •   20  
      Remote SensingAtmospheric ChemistryData AssimilationAtmospheric sciences
    • by 
    •   11  
      Flow CytometrySurvival AnalysisApoptosisHumans
    • by 
    •   6  
      Information TechnologyMobile ComputingSecurity AnalysisMobile phone
    • by 
    •   5  
      Machine LearningWeb PagesCommon CriteriaPoint of View
    • by 
    •   4  
      Ministry of EducationSecondary SchoolConstruction ProcessCommon Criteria
    • by 
    •   22  
      Medication AdherenceDrug interactionsClinical PharmacyHumans
    • by 
    •   8  
      Software DevelopmentSecurity EngineeringComputer SoftwareSecurity Requirements
    • by 
    •   21  
      GeneticsDecision MakingClinical TrialRisk
    • by 
    •   15  
      Computer SecurityCryptographyDesign processSmart Cards
Security and requirements engineering are one of the most important factor of success in the development of a software product line due to the complexity and extensive nature of them, given that a weakness in security can cause problems... more
    • by 
    •   18  
      Quality ManagementSecurityEngineering ManagementSystems Analysis
    • by 
    •   6  
      Artificial IntelligenceCommand and ControlMeasures of EffectivenessCommon Criteria
    • by 
    •   15  
      Information SystemsPublic AdministrationRequirements EngineeringRisk Analysis
In the field of security software, the Common Criteria (CC) constitute an ISO standard for the evaluation of products and systems from Information Technologies. The international recognition of the Common Criteria justifies the investment... more
    • by 
    •   9  
      Information TechnologyFormal methodSymbolic ExecutionReference model
    • by 
    •   4  
      Formal Methods (Formal Verification)Game TheoryTrustCommon Criteria
Software reliability is a core requirement for safety- and security-critical systems. In the area of avionics, for example, the DO-178B standard requires extensive validation, such as software reviews, requirement engineering, coverage... more
    • by 
    •   3  
      Software ReliabilitySource CodeCommon Criteria
    • by 
    •   9  
      Information TechnologyPacific NorthwestSystem DevelopmentVulnerability assessment
    • by 
    •   7  
      Languages and LinguisticsHebrew LanguageSpeech ProsodyCorpus Linguistics
    • by 
    •   23  
      Remote SensingAtmospheric ChemistryTime SeriesStatistical Analysis
    • by 
    •   17  
      GovernmentIntegral EquationsInformation FlowDynamics
    • by 
    •   22  
      SoilPhytoremediationBioremediationEndangered Species
    • by 
    •   10  
      Embedded SoftwareTheorem ProvingFormal SpecificationFormal Verification