Sciweavers

3555 search results - page 539 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
MODELS
2009
Springer
15 years 10 months ago
Language support for feature-oriented product line engineering
Product line engineering is an emerging paradigm of developing a family of products. While product line analysis and design mainly focus on reasoning about commonality and variabi...
Wonseok Chae, Matthias Blume
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
15 years 8 months ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
CG
2000
Springer
15 years 8 months ago
Chess Neighborhoods, Function Combination, and Reinforcement Learning
Abstract. Over the years, various research projects have attempted to develop a chess program that learns to play well given little prior knowledge beyond the rules of the game. Ea...
Robert Levinson, Ryan Weber
ISSAC
1994
Springer
102views Mathematics» more  ISSAC 1994»
15 years 8 months ago
An Application of Symbolic Computation in the Physical Sciences
An example of a problem in the physical sciences is discussed where application of various symbolic computation facilities available in many algebraic computing systems leads to a...
Charles C. Dyer
CPA
1995
143views Cryptology» more  CPA 1995»
15 years 7 months ago
Crypto in Europe - Markets, Law and Policy
Much of the debate on cryptography has assumed that the real tension is between the state’s desire for effective policing and the privacy of the individual. We argue that this i...
Ross J. Anderson