Sciweavers

12670 search results - page 141 / 2534
» Requirements Modeling
Sort
View
121
Voted
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 4 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
101
Voted
WSC
1997
15 years 4 months ago
Application of Simulation Modeling to Emergency Population Evacuation
A simulation model was developed to predict with a certain degree of probability the optimal escape routs from the coastal areas of the Rio Grand Valley. Along with that, the mode...
Kambiz Farahmand
HT
1998
ACM
15 years 7 months ago
XHMBS: A Formal Model to Support Hypermedia Specification
This paper introduces XHMBS (the eXtended Hyperdocument Model Based on Statecharts) to support the formal specification of general hypermedia applications. XHMBS uses a novel form...
Fabiano Borges Paulo, Marcelo Augusto Santos Turin...
ICSEA
2009
IEEE
15 years 10 months ago
Rule-Based Service Modeling
— In the context of service-oriented computing, services provide the capabilities necessary to support the business, especially its processes. Within the service modeling process...
Michael Gebhart, Sebastian Abeck
CAISE
1999
Springer
15 years 7 months ago
A Multi-variant Approach to Software Process Modelling
: In this article we present a new approach to software process modelling for a large banking organisation. In the past years, the main software development methods and tools of th...
Wolfgang Hesse, Jörg Noack