Sciweavers

2043 search results - page 395 / 409
» Reasoning About Security Models
Sort
View
116
Voted
ER
2006
Springer
169views Database» more  ER 2006»
15 years 2 months ago
A More Expressive Softgoal Conceptualization for Quality Requirements Analysis
Initial software quality requirements tend to be imprecise, subjective, idealistic, and context-specific. An extended characterization of the common Softgoal concept is proposed fo...
Ivan Jureta, Stéphane Faulkner, Pierre-Yves...
102
Voted
DAGSTUHL
2007
15 years 1 months ago
Programming self developing blob machines for spatial computing.
: This is a position paper introducing blob computing: A Blob is a generic primitive used to structure a uniform computing substrate into an easier-to-program parallel virtual mach...
Frédéric Gruau, Christine Eisenbeis
112
Voted
AAAI
2006
15 years 1 months ago
ScriptEase - Motivational Behaviors for Interactive Characters in Computer Role-Playing Games
ScriptEase is a tool that allows authors with no programming experience to create interactive stories for computer role-playing games. Instead of writing scripting code manually, ...
Maria Cutumisu, Duane Szafron, Jonathan Schaeffer,...
120
Voted
ESANN
2004
15 years 1 months ago
Neural networks for data mining: constrains and open problems
When we talk about using neural networks for data mining we have in mind the original data mining scope and challenge. How did neural networks meet this challenge? Can we run neura...
Razvan Andonie, Boris Kovalerchuk
139
Voted
IADIS
2004
15 years 1 months ago
A Study on Mobile Game Adoption Under HPI(High-Speed Portable Internet) Environment
Mobile game is considered as one of the emerging mobile services in recent years. A number of mobile game companies have been established and on-line game providers have also atte...
Young Seog Yoon, Im Sook Há, Mun Kee Choi