Sciweavers

1486 search results - page 99 / 298
» Firewall Rules Analysis
Sort
View
QSIC
2005
IEEE
15 years 9 months ago
Ontology Based Requirements Analysis: Lightweight Semantic Processing Approach
We propose a software requirements analysis method based on domain ontology technique, where we can establish a mapping between a software requirements specification and the doma...
Haruhiko Kaiya, Motoshi Saeki
DIGRA
2005
Springer
15 years 9 months ago
Towards an Ontological Language for Game Analysis
The Game Ontology Project (GOP) is creating a framework for describing, analyzing and games, by defining a hierarchy of concepts abstracted from an analysis of many specific games...
José Pablo Zagal, Michael Mateas, Clara Fer...
ISMIS
2005
Springer
15 years 9 months ago
Model-Based Cluster Analysis for Web Users Sessions
One of the main issues inWeb usage mining is the discovery of patterns in the navigational behavior of Web users. Standard approaches, such as clustering of users’sessions and di...
George Pallis, Lefteris Angelis, Athena Vakali
IEAAIE
2004
Springer
15 years 9 months ago
Natural Language Requirements Analysis and Class Model Generation Using UCDA
This paper presents a methodology to automate natural language requirements analysis and class model generation based on the Rational Unified Process (RUP). Use-case language schem...
Dong Liu, Kalaivani Subramaniam, Armin Eberlein, B...
ACSC
2002
IEEE
15 years 8 months ago
Alias Analysis for Exceptions in Java
We propose a flow-sensitive alias analysis algorithm that computes safe and efficient alias sets in Java. For that, we propose a references-set representation of aliased elements,...
Jehak Woo, Jongwook Woo, Isabelle Attali, Denis Ca...