Sciweavers

1990 search results - page 218 / 398
» Integrated Human Behavior Modeling
Sort
View
IEEEHPCS
2010
15 years 1 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
DSRT
2008
IEEE
15 years 9 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
CIKM
2008
Springer
15 years 5 months ago
Towards a model of understanding social search
Search engine researchers typically depict search as the solitary activity of an individual searcher. In contrast, results from our critical-incident survey of 150 users on Amazon...
Brynn M. Evans, Ed H. Chi
129
Voted
CGA
2008
15 years 3 months ago
Virtual Inspector: A Flexible Visualizer for Dense 3D Scanned Models
The rapid evolution of automatic shape acquisition technologies will make huge amount of sampled 3D data available in the near future. Cultural Heritage (CH) domain is one of the ...
Marco Callieri, Federico Ponchio, Paolo Cignoni, R...
131
Voted
ICCAD
2001
IEEE
107views Hardware» more  ICCAD 2001»
16 years 6 days ago
A Convex Programming Approach to Positive Real Rational Approximation
As system integration evolves and tighter design constraints must be met, it becomes necessary to account for the non-ideal behavior of all the elements in a system. Certain devic...
Carlos P. Coelho, Joel R. Phillips, Luis Miguel Si...