Sciweavers

1441 search results - page 110 / 289
» A Practical Approach to Network-Based Processing
Sort
View
ECIS
2004
15 years 2 months ago
The scenario for constructing flexible, people-focused systems development methodologies
Systems development is a very complex process, which requires disciplined methodological approaches. While there are many arguments underpinning the use of systems development met...
Marko Bajec, Marjan Krisper, Rok Rupnik
99
Voted
VMV
2000
167views Visualization» more  VMV 2000»
15 years 1 months ago
Voxelisation: Modelling for Volume Graphics
Voxelisation is the term given to the process of converting data from one source type into a three dimensional volume of data values. The techniques known collectively as volume v...
Mark W. Jones, Richard Satherley
IFM
2010
Springer
152views Formal Methods» more  IFM 2010»
14 years 10 months ago
Specification and Verification of Model Transformations Using UML-RSDS
In this paper we describe techniques for the specification and verification of model transformations using a combination of UML and formal methods. The use of UML 2 notations to s...
Kevin Lano, Shekoufeh Kolahdouz Rahimi
BMCV
2000
Springer
15 years 5 months ago
A New Line Segment Grouping Method for Finding Globally Optimal Line Segments
In this paper we propose a new method for extracting line segments from edge images. Our method basically follows a line segment grouping approach. This approach has many advantage...
Jeong-Hun Jang, Ki-Sang Hong
104
Voted
DBSEC
2010
126views Database» more  DBSEC 2010»
15 years 2 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...