Sciweavers

3801 search results - page 648 / 761
» An Approach to Modeling Software Safety
Sort
View
CCE
2004
14 years 9 months ago
Part II. Future perspective on optimization
Following from part I, which presents a retrospective on optimization, we focus here on areas that are recent active research topics and are likely to strongly influence the futur...
Ignacio E. Grossmann, Lorenz T. Biegler
KBS
2002
88views more  KBS 2002»
14 years 9 months ago
Detecting mismatches among experts' ontologies acquired through knowledge elicitation
: We have constructed a set of ontologies modelled on conceptual structures elicited from several domain experts. Protocols were collected from various experts who advise on the se...
Adil Hameed, Derek H. Sleeman, Alun D. Preece
JUCS
2010
130views more  JUCS 2010»
14 years 8 months ago
CAUCE: Model-driven Development of Context-aware Applications for Ubiquitous Computing Environments
: In order to develop context-aware applications for ubiquitous computing environments we have defined an MDA approach that defines three layers of models. The first layer captures...
Ricardo Tesoriero, José A. Gallud, Mar&iacu...
RAID
2010
Springer
14 years 8 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
SEMWEB
2010
Springer
14 years 7 months ago
Semantic Recognition of Ontology Refactoring
Abstract. Ontologies are used for sharing information and are often collaboratively developed. They are adapted for different applications and domains resulting in multiple version...
Gerd Gröner, Fernando Silva Parreiras, Steffe...