Sciweavers

2740 search results - page 240 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
SAC
2010
ACM
15 years 9 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
ICVS
2003
Springer
15 years 9 months ago
A Framework for Visual Servoing
We consider typical manipulation tasks in terms of a service robot framework. Given a task at hand, such as ”Pick up the cup from the dinner table”, we present a number of diff...
Danica Kragic, Henrik I. Christensen
ICDCS
1996
IEEE
15 years 8 months ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...
FASE
2008
Springer
15 years 5 months ago
Verification of Architectural Refactorings by Rule Extraction
With the success of model-driven development as well as component-based and service-oriented systems, models of software architecture are key artefacts in the development process. ...
Dénes Bisztray, Reiko Heckel, Hartmut Ehrig
DLOG
1996
15 years 5 months ago
A Translation Scheme for Domain Ontologies Based on Model Ontologies of KBS
To ensure the re-use of domain ontologies the usual approach relies on a pivot language, e.g., Kif, intoandfromwhich the domainontologyis translated. This requires several distinc...
Houria Mihoubi, Ana Simonet, Michel Simonet