نتایج جستجو برای: specification limits
تعداد نتایج: 193652 فیلتر نتایج به سال:
The traditional Dolev-Yao model of security limits attacks to “computationally feasible” operations. We depart from this model by assigning a cost to protocol actions, both of the Dolev-Yao kind as well as non traditional forms such as computationally-hard operations, guessing, principal subversion, and failure. This quantitative approach enables evaluating protocol resilience to various forms ...
Mastering software process is a keypoint in the improvement of application quality. OMG proposes the SPEM metamodel to model software processes. Unfortunately, it is a high level specification which lacks a formal description of its semantics. It is thus difficult to use SPEM. So, we propose a restriction of SPEM that clarifies its concepts and which is completed with a formalization of its sem...
Reconfigurable networked systems have often been developed via dynamically deployed software components that are executing on top of interconnected heterogenous hardware nodes. The challenges resulting from the complexity of those systems have been traditionally mitigated by creative ad-hoc solutions supported by domain specific modeling frameworks and methodologies. Targeting that deficiency, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید