Sciweavers

1100 search results - page 27 / 220
» From Goals to Aspects: Discovering Aspects from Requirements...
Sort
View
CCS
2006
ACM
15 years 5 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
FGR
2000
IEEE
157views Biometrics» more  FGR 2000»
15 years 6 months ago
Hand Gesture Recognition Using Input-Output Hidden Markov Models
A new hand gesture recognition method based on Input– Output Hidden Markov Models is presented. This method deals with the dynamic aspects of gestures. Gestures are extracted fr...
Sébastien Marcel, Olivier Bernier, Jean-Emm...
93
Voted
POLICY
2005
Springer
15 years 7 months ago
Embedding Policy Rules for Software-Based Systems in a Requirements Context
Policy rules define what behavior is desired in a softwarebased system, they do not describe the corresponding action and event sequences that actually “produce” desired (“...
Mark Strembeck
112
Voted
IEE
2008
120views more  IEE 2008»
15 years 1 months ago
Software evolutionary dynamics modelled as the activity of an actor-network
The pressures which act on a software system over its life from inception to retirement are many and varied. It is an important goal in considering software evolvability to unders...
Paul Wernick, Tracy Hall, Chrystopher L. Nehaniv
AOSE
2005
Springer
15 years 7 months ago
Incorporating Commitment Protocols into Tropos
This paper synthesizes two trends in the engineering of agent-based systems. One, modern agent-oriented methodologies deal with the key aspects of software development including re...
Ashok U. Mallya, Munindar P. Singh