Sciweavers

850 search results - page 81 / 170
» An Expeditious Approach to Modeling IDE Interaction Design
Sort
View
KBSE
2007
IEEE
15 years 4 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
VISUAL
1999
Springer
15 years 2 months ago
General Image Database Model
In this paper we propose a new General Image DataBase (GIDB) model. The model establishes taxonomy based on the systematisation of existing approaches. The GIDB model is based on t...
Peter L. Stanchev
CIA
2004
Springer
15 years 3 months ago
Reasoning About Communication - A Practical Approach Based on Empirical Semantics
Given a specification of communication rules in a multiagent system (in the form of protocols, ACL semantics, etc.), the question of how to design appropriate agents that can oper...
Felix A. Fischer, Michael Rovatsos
SDM
2009
SIAM
204views Data Mining» more  SDM 2009»
15 years 7 months ago
Application of Bayesian Partition Models in Warranty Data Analysis.
Automotive companies are forced to continuously extend and improve their product line-up. However, increasing diversity, higher design complexity, and shorter development cycles c...
Axel Blumenstock, Christoph Schlieder, Markus M&uu...
MSWIM
2009
ACM
15 years 4 months ago
Designing an asynchronous group communication middleware for wireless users
We evaluate an asynchronous gossiping middleware for wireless users that propagates messages from any group member to all the other group members. This propagation can either be i...
Xuwen Yu, Surendar Chandra