Search
Now showing items 21-30 of 4955
(Master thesis / Masteroppgave, 2011)
Recently IPv6 has become a worldwide topic because of IPv4 address exhaustion, much is due to the Internet Assigned Numbers Authority (IANA) allocated the final IPv4 address blocks in February, 2011. IPv6 solves the ...
(Master thesis / Masteroppgave, 2017)
Threat modelling is a component in security risk analysis, and it is commonly conducted by applying a specific approach for discovering and modelling threats. The three main approaches for threat modelling are asset-centric, ...
Service Integration and Management Innføring av Service Integration And Management i DNBs IT organisasjon Restricted Access
(Master thesis / Masteroppgave, 2015)
Presset og kravet til IT-enheter i selskaper har økt når det gjelder å effektivisere og å profesjonalisere måten de utøver sine Service Management prosesser. IT-tjenestene har i de siste 20 årene endret seg og blitt mer ...
(Research report / Forskningsrapport, 2007)
Mobile Ad-Hoc Networks (MANETs) are an important communication infrastructure to support emergency and rescue operations. To address the frequent disconnections and network partitions that might occur, we have developed a ...
(Research report / Forskningsrapport, 2007)
(Journal article / Tidsskriftartikkel / AcceptedVersion; Peer reviewed, 2014)
(Research report / Forskningsrapport, 1994)
Functional integration is the compatibility between the structure, culture and competence of an organization and its computer systems, specifically the availability of data and functionality and the consistency of user ...
(Research report / Forskningsrapport, 2003)
OMG promotes Model Driven Architecture (MDA) as the new direction for system development, especially supporting integration, interoperability and portability. But what is MDA really about, and what is model driven architecture? ...
(Research report / Forskningsrapport, 2004)
Real-Time Maude is a language and tool supporting the formal specification and analysis of realtime and hybrid systems. The specification formalism is based on rewriting logic, emphasizes generality and ease of specification, ...
(Research report / Forskningsrapport, 2005)
In UML, the operator neg is used to specify negative, or unwanted, system behaviour. We agree that being able to specify negative behaviour is important. However, the UML neg is currently not wellsuited for this purpose, ...