Sciweavers

2748 search results - page 229 / 550
» Generating Object-Z Specifications from Use Cases
Sort
View
95
Voted
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
15 years 5 months ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
104
Voted
ICTAC
2004
Springer
15 years 6 months ago
Minimal Spanning Set for Coverage Testing of Interactive Systems
A model-based approach for minimization of test sets for interactive systems is introduced. Test cases are efficiently generated and selected to cover the behavioral model and the ...
Fevzi Belli, Christof J. Budnik
100
Voted
VIS
2009
IEEE
150views Visualization» more  VIS 2009»
16 years 2 months ago
VisMashup: Streamlining the Creation of Custom Visualization Applications
Visualization is essential for understanding the increasing volumes of digital data. However, the process required to create insightful visualizations is involved and time consumin...
Emanuele Santos, Lauro Lins, James P. Ahrens, J...
109
Voted
CAISE
2006
Springer
15 years 4 months ago
Describing Interoperability: the OoI Ontology
Abstract. Though ontologies are widely used to solve some specific interoperability problems, there is no specific ontology defining what interoperability actually is, independentl...
Yannick Naudet, Thibaud Latour, Kevin Hausmann, Sv...
USS
2004
15 years 2 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp