Sciweavers

1662 search results - page 225 / 333
» Privately Finding Specifications
Sort
View
94
Voted
RE
2006
Springer
15 years 20 days ago
Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling
In goal-oriented requirements engineering (GORE), one usually proceeds from a goal analysis to a requirements specification, usually of IT systems. In contrast, we consider the us...
Jaap Gordijn, Michaël Petit, Roel Wieringa
110
Voted
SMA
2008
ACM
110views Solid Modeling» more  SMA 2008»
15 years 20 days ago
Probabilistic model of triangulation
This paper analyses the probability that randomly deployed sensor nodes triangulate any point within the target area. Its major result is the probability of triangulation for any p...
Xiaoyun Li, David K. Hunter
119
Voted
IJSWIS
2007
113views more  IJSWIS 2007»
15 years 20 days ago
A Formal Foundation for Ontology-Alignment Interaction Models
Ontology alignment foundations are hard to find in the literature. The abstract nature of the topic and the diverse means of practice make it difficult to capture it in a universal...
W. Marco Schorlemmer, Yannis Kalfoglou, Manuel Ate...
TCBB
2008
103views more  TCBB 2008»
15 years 19 days ago
DNA Motif Representation with Nucleotide Dependency
The problem of discovering novel motifs of binding sites is important to the understanding of gene regulatory networks. Motifs are generally represented by matrices (PWM or PSSM) o...
Francis Y. L. Chin, Henry C. M. Leung
TDSC
2008
152views more  TDSC 2008»
15 years 19 days ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...