Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Reusable knowledge in security requirements engineering: a systematic map** study
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …
system development. Over the last two decades, researchers and engineers have …
NDA: Near-DRAM acceleration architecture leveraging commodity DRAM devices and standard memory modules
Energy consumed for transferring data across the processor memory hierarchy constitutes a
large fraction of total system energy consumption, and this fraction has steadily increased …
large fraction of total system energy consumption, and this fraction has steadily increased …
A comparison of security requirements engineering methods
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …
security requirements elicitation and analysis. This conceptual framework establishes a …
Using hybrid branch predictors to improve branch prediction accuracy in the presence of context switches
M Evers, PY Chang, YN Patt - ACM SIGARCH Computer Architecture …, 1996 - dl.acm.org
Pipeline stalls due to conditional branches represent one of the most significant
impediments to realizing the performance potential of deeply pipelined, superscalar …
impediments to realizing the performance potential of deeply pipelined, superscalar …
A systematic review and analytical evaluation of security requirements engineering approaches
Security is an inevitable concern in today's scenario of software-based application's
pervasiveness and development practices. Researchers and practitioners frequently …
pervasiveness and development practices. Researchers and practitioners frequently …
Engineering requirements for adaptive systems
The increasing demand for complex and distributed software calls for novel software
engineering methods and techniques, to create systems able to autonomously adapt to …
engineering methods and techniques, to create systems able to autonomously adapt to …
A goal oriented approach for modeling and analyzing security trade-offs
G Elahi, E Yu - Conceptual Modeling-ER 2007: 26th International …, 2007 - Springer
In designing software systems, security is typically only one design objective among many. It
may compete with other objectives such as functionality, usability, and performance. Too …
may compete with other objectives such as functionality, usability, and performance. Too …
Swarm coordination of mini-UAVs for target search using imperfect sensors
Abstract Unmanned Aerial Vehicles (UAVs) have a great potential to support search tasks in
unstructured environments. Small, lightweight, low speed and agile UAVs, such as …
unstructured environments. Small, lightweight, low speed and agile UAVs, such as …
Model driven development of multi-agent systems
From a software engineering point of view, the agent paradigm has shown its potential for
modelling in different domains. However, moving from agent models to implementation is …
modelling in different domains. However, moving from agent models to implementation is …
Business and model-driven development of BDI multi-agent systems
Abstract Model-driven development allows IT professionals to specify the system
functionality, organization and behavior in a logical or platform-independent manner …
functionality, organization and behavior in a logical or platform-independent manner …