Sciweavers

607 search results - page 112 / 122
» Managing Constraint Violations in Administrative Information...
Sort
View
MMMACNS
2001
Springer
15 years 4 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
CIT
2007
Springer
15 years 3 months ago
An Aspect Enhanced Method of NFR Modeling in Software Architecture
Existence of crosscutting concerns in software requirements often intensifies complexity of software development. Modeling and analysis of these concerns at software architecture ...
Hamid Bagheri, Seyed-Hassan Mirian-Hosseinabadi, H...
CAISE
2000
Springer
15 years 4 months ago
An Overview of RoZ: A Tool for Integrating UML and Z Specifications
This paper presents an approach and a tool to increase specification quality by using a combination of UML and formal languages. Our approach is based on the expression of the UML ...
Sophie Dupuy, Yves Ledru, Monique Chabre-Peccoud
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
15 years 3 months ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...
CCS
2009
ACM
16 years 8 days ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...