نتایج جستجو برای: profile software

تعداد نتایج: 649666  

2007
George Wilson Klaus Weidner

LinuxTM distributions have received numerous Common Criteria certifications in the last few years. Building on the recent Controlled Access Protection Profile (CAPP) certifications, an Open Source development effort to make Linux compliant with the Labeled Security Protection Profile (LSPP) and Role-Based Access Control Protection Profile (RBACPP) has been ongoing for almost two years. Developm...

2007
Mark Stamp David Taylor Teng Moh

Computer viruses and other forms of malware pose a threat to virtually any software system. A computer virus is a piece of software which takes advantage of known weaknesses in a software system, and usually has the ability to deliver a malicious payload. A common technique that virus writers use to avoid detection is to enable the virus to change itself by having some kind of self-modifying co...

2006
Jeffrey M. Voas

The ubiquity of information systems has made correct and reliable operation of critical systems indispensable. The trustworthiness of digital systems is increasingly dependent on the trustworthiness of the software. While hardware trustworthiness is by no means a solved problem, systemwide problems are increasingly blamed on poorly tested, defective software. System trustworthiness is therefore...

2002
Wolfgang Pree Marcus Fontoura Bernhard Rumpe

The Unified Modeling Language (UML) community has started to define so-called profiles in order to better suit the needs of specific domains or settings. Product lines1 represent a special breed of systems—they are extensible semi-finished pieces of software. Completing the semi-finished software leads to various software pieces, typically specific applications, which share the same core. Thoug...

2006
Mauro Caporuscio Valérie Issarny

B3G is an emerging network technology which conceives the convergence of telecommunication and IP-based networks for providing enhanced services able to transfer both voice and non-voice data through wired and wireless networks. Moreover, B3G networks can be no longer considered as “passive” entities which only transport data between endpoints, but they must be considered as “active” parties th...

2005
Aphrodite Tsalgatidou George Athanasopoulos Periklis Liaskovitis

Peer-to-peer (p2p) applications exhibit characteristics such as dynamic network topology and configuration, heterogeneity and scalability that make their development a complicated task. This is further aggravated due to the required satisfaction of dependability properties, i.e. security, availability, reliability, etc. Furthermore, p2p application requirements are driven by the software archit...

2014
Haochen Zhang Min-Yen Kan Yiqun Liu Shaoping Ma

Piecing together social signals from people in different online social networks is key for downstream analytics. However, users may have different usernames in different social networks, making the linkage task difficult. To enable this, we explore a probabilistic approach that uses a domain-specific prior knowledge to address this problem of online social network user profile linkage. At scale...

2000
Nuno Jardim Nunes João Falcão e Cunha

The UML is recognized to be the dominant diagrammatic modeling language in the software industry. However, it’s support for building interactive systems is still acknowledged to be insufficient. In this paper we discuss and identify the major problems using the UML framework for interactive system development, specifically, in what concerns the architectural issues. Here we present a conceptual...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید