Sciweavers

1100 search results - page 38 / 220
» From Goals to Aspects: Discovering Aspects from Requirements...
Sort
View
111
Voted
IEEEARES
2007
IEEE
15 years 8 months ago
From Trust to Dependability through Risk Analysis
The importance of critical systems has been widely recognized and several efforts are devoted to integrate dependability requirements in their development process. Such efforts re...
Yudistira Asnar, Paolo Giorgini, Fabio Massacci, N...
IJNSEC
2008
88views more  IJNSEC 2008»
15 years 1 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
ACMICEC
2007
ACM
129views ECommerce» more  ACMICEC 2007»
15 years 5 months ago
Modeling trust in e-commerce: an approach based on user requirements
E-commerce is presently operating under its expected capacity, mainly because traders find it very difficult to trust one another online for trading decisions. It is therefore ver...
Alireza Pourshahid, Thomas T. Tran
NIPS
2004
15 years 3 months ago
Assignment of Multiplicative Mixtures in Natural Images
In the analysis of natural images, Gaussian scale mixtures (GSM) have been used to account for the statistics of filter responses, and to inspire hierarchical cortical representat...
Odelia Schwartz, Terrence J. Sejnowski, Peter Daya...
123
Voted
ISMIR
2004
Springer
154views Music» more  ISMIR 2004»
15 years 7 months ago
Mapping Music In The Palm Of Your Hand, Explore And Discover Your Collection
The trends of miniaturization and increasing storage capabilities for portable music players made it possible to carry increasingly more music on small portable devices, but it al...
Fabio Vignoli, Rob van Gulik, Huub van de Wetering