• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 22
  • 16
  • 9
  • 6
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 70
  • 19
  • 13
  • 11
  • 10
  • 10
  • 10
  • 10
  • 10
  • 9
  • 9
  • 9
  • 9
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Automatic test generation based on formal specifications practical procedures for efficient state space exploration and improved representation of test cases /

Schmitt, Michael. January 2003 (has links) (PDF)
Göttingen, Univ., Diss., 2003. / Computerdatei im Fernzugriff.
2

Formal semantics for SDL definition and implementation /

Prinz, Andreas. January 2001 (has links) (PDF)
Berlin, Humboldt-University, Habil.-Schr., 2001.
3

Formale Semantik des Datentypmodells von SDL-2000

Löwis of Menar, Martin von. January 2003 (has links) (PDF)
Berlin, Humboldt-Universiẗat, Diss., 2003.
4

Services à haute intensité technologique : l'adoption des services de données pour téléphonie mobile en France / Technology-based services : data mobile services adoption in France

Moreno Alcerreca, Christina 22 March 2010 (has links)
Face au développement des services à haute intensité technologique, se pose le problème de leur acceptation. En téléphonie mobile, les Français se rallient progressivement à ces services et cette thèse vise à comprendre cette adoption. La revue de littérature fondée sur l’adoption des innovations et son adaptation au domaine des services permet d’identifier les principaux facteurs qui influencent l’adoption des services à haute intensité technologique. Une étude qualitative exploratoire a permis d’enrichir notre cadre conceptuel que nous avons testé dans une seconde phase auprès de 350 utilisateurs de services mobiles. Finalement, la réalisation d’une étude de cas s’est avérée nécessaire pour expliquer le décollage des services de données en France à partir du lancement sur le marché d’un nouveau téléphone multifonction Smartphone en 2007-2008. Les résultats des trois études réalisées révèlent que les principaux construits du TAM sont pertinents pour expliquer l’utilisation des services à haute intensité technologique. Nos résultats mettent en valeur l’influence des communautés de marque dans le processus d’adoption des équipements et services mobiles. / With the development of technology-based services the question of the level of their acceptance was raised. In mobile communication, the French progressively adopt these services. This thesis aims to understand this adoption. The study of the literature in innovations adoption helped us to identify the main factors influencing technology-based services adoption. An exploratory quality study helped us to enrich our conceptual framework. The proposed model was evaluated by quantitative survey among 350 mobile services users. Finally, the execution of a case study proved itself necessary to explain the take-off of the mobile data services in France due to the launch of a multifunction Smartphone device. The results of the three studies reveal that the TAM constructions are pertinent in the explanation of the technology-based services usage. Our results highlight the influence of brand communities in the technology-based services adoption process.
5

Softwarekomponenten mit eODL und SDL für verteilte Systeme /

Böhme, Harald. January 2007 (has links) (PDF)
Humboldt-Univ., Diss.--Berlin, 2007.
6

Implementierung einiger OAM-Funktionen zur Evaluation der Sprache SDL und des Frameworks ObjectGEODE

Maerz, Peter. January 1997 (has links)
Stuttgart, Univ., Fakultät Informatik, Diplomarb., 1997.
7

Développement d'un éditeur graphique pour les suites de tests de protocoles de communication

Soukeur, Abdelouahed January 1997 (has links)
Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.
8

Spezifikation einer Steuerungssoftware für eine CAN-Bus gesteuerte Kraftfahrzeugtüre in SDL

Wörn, Michael. January 1998 (has links)
Stuttgart, Univ., Fakultät Informatik, Diplomarb., 1998.
9

Entwurfsbegleitende Leistungsanalyse für SDL-basiertes Design multimedialer Internet-Transportsysteme

Hintelmann, Jörg. Unknown Date (has links)
Universiẗat, Diss., 2000--Essen.
10

A situation analysis of the security awareness at Software Vendors and how to best inform them about the Microsoft Security Development Lifecycle / Nulägesanalys av säkerhetsmedvetenheten hos programvaruleverantörer och informationsspridningenom Microsoft Security Development Lifecycle

Gunnbäck, Johannes, Mischel, Helena January 2010 (has links)
<p>In January 2002 Bill Gates sent out the renowned "Trustworthy Computing" memo where he announced that the company would shift their focus from adding new features and functionality to security and privacy. This was what led to the formulation of the Security Development Lifecycle (SDL). This process is now mandatoryfor all development at Microsoft with meaningful business risk and/or with accessto sensitive data. The SDL led to great improvements of the number and severityof vulnerabilities in the products that went through the process. When the vulnerabilitiesin the Operation System (OS) were diminished Microsoft noticed thatthe threats moved to the application layer. This led to them wanting to spread their model to application developers. One interesting target group is mid-sized Independent Software Vendors (ISVs), mainly because there are so many of them. Finding out what development process they use today and how they would benefitfrom and could be informed about the SDL is of interest for Microsoft. Interviews with Microsoft evangelists, security experts and representatives from the target group has been preformed to get a better understanding of the situationtoday and how it could be improved. The interviews have resulted in a numberof recommendations for how to adjust the SDL and the information concerningthe process to meet mid-sized ISVs needs. A clear need for information, that is categorized and directed to the different bussiness areas in the software industry, with specific recommendations and courses of action for each of them, has beenidentified. The inter views have also resulted in a situation analysis of the security awareness at the target group today and the experts view of what activities in the SDL they would benefit from. The maturity level amongst the ISVs was found to be low and their own estimated vulnerability level was low. The estimated security awareness in the future on the other hand is high, this can be accounted for the upcoming migration to cloud services that is requested by the customersand the security issues this will lead to. One thing that is agreed upon that would be suitable to introduce is threat modeling. This requires little security knowledge yet leads to dramatic reduction in vulnerabilities. The experts have also shared improvements they think could be made on the SDL.</p>

Page generated in 0.0247 seconds