Sciweavers

489 search results - page 59 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
104
Voted
SIVP
2008
127views more  SIVP 2008»
15 years 12 days ago
Image indexing and retrieval using expressive fuzzy description logics
Abstract The effective management and exploitation of multimedia documents requires the extraction of the underlying semantics. Multimedia analysis algorithms can produce fairly ri...
Nikos Simou, Thanos Athanasiadis, Giorgos Stoilos,...
SAC
2008
ACM
14 years 11 months ago
Data sharing vs. message passing: synergy or incompatibility?: an implementation-driven case study
One reasonable categorization of coordination models is into data sharing or message passing, based on whether the information necessary to coordination is persistently stored and...
Matteo Ceriotti, Amy L. Murphy, Gian Pietro Picco
78
Voted
ICSE
2000
IEEE-ACM
15 years 4 months ago
An inheritance-based technique for building simulation proofs incrementally
This paper presents a technique for incrementally constructing safety specifications, abstract algorithm descriptions, and simulation proofs showing that algorithms meet their spe...
Idit Keidar, Roger Khazan, Nancy A. Lynch, Alexand...
IEEECIT
2010
IEEE
14 years 11 months ago
The Strategy of Advancing Mobile Web Application's Layout and Drawing
As the time of mobile Internet has come gently, the mobile applications has progressively designed by techniques based on web technology. The web technology has a lot of strong po...
Liankui Qiu, Panlong He, Lei Luo
118
Voted
AGENTS
1997
Springer
15 years 4 months ago
INSIGHT: A Virtual Laboratory for Looking into Behavior-Based Autonomous Agents
This paper introduces a 3D simulation environment for experiments with behavior-based autonomous agents. The virtual laboratory INSIGHT allows the user to design and run a great v...
Simone Strippgen