Sciweavers

2205 search results - page 243 / 441
» Mutation Operators for Specifications
Sort
View
CSCW
2002
ACM
15 years 3 months ago
A new dimension in access control: studying maintenance engineering across organizational boundaries
Inter-organizational cooperation has specific requirements for access control. The paper presents the results from a field study which looks at the cooperation between two enginee...
Gunnar Stevens, Volker Wulf
IJDAR
2000
60views more  IJDAR 2000»
15 years 3 months ago
Integrated text and line-art extraction from a topographic map
Our proposed approach to text and line-art extraction requires accurately locating a text-string box and identifying external line vectors incident on the box. The results of extra...
Luyang Li, George Nagy, Ashok Samal, Sharad C. Set...
EL
2002
134views more  EL 2002»
15 years 3 months ago
Security issues in online games
The traditional target of computer game security is mainly copy protection. The emergence of online games fundamentally changes the security requirements for computer games. Althou...
Jianxin Jeff Yan, Hyun-Jin Choi
ENTCS
2002
91views more  ENTCS 2002»
15 years 3 months ago
Memoization-Based Proof Search in LF - an Experimental Evaluation of a Prototype
Elf is a general meta-language for the specification and implementation of logical systems in the style of the logical framework LF. Proof search in this framework is based on the...
Brigitte Pientka
TKDE
2002
77views more  TKDE 2002»
15 years 3 months ago
Materialization and Its Metaclass Implementation
Materialization is a powerful and ubiquitous abstraction pattern for conceptual modeling that relates a class of categories (e.g., models of cars) and a class of more concrete obje...
Mohamed Dahchour, Alain Pirotte, Esteban Zim&aacut...