Sciweavers

2612 search results - page 391 / 523
» Semantic Attention Management
Sort
View
114
Voted
ACMICEC
2006
ACM
159views ECommerce» more  ACMICEC 2006»
15 years 7 months ago
Choreography of web services based on natural language storybooks
Business processes usually span beyond the boundaries of single operations and many a process spans even beyond the boundaries of organizations. Web Service orchestration or chore...
Kurt Englmeier, Javier Pereira, Josiane Mothe
142
Voted
GIR
2006
ACM
15 years 7 months ago
Associating spatial patterns to text-units for summarizing geographic information
Retrieving data based not only on key words is a challenge. We worked on semi-structured data (cultural heritage corpora). Our project aimed at getting the most relevant text-unit...
Julien Lesbegueries, Christian Sallaberry, Mauro G...
SACMAT
2006
ACM
15 years 7 months ago
Information flow property preserving transformation of UML interaction diagrams
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
Fredrik Seehusen, Ketil Stølen
ICCD
2005
IEEE
124views Hardware» more  ICCD 2005»
15 years 7 months ago
Model Checking C Programs Using F-SOFT
— With the success of formal verification techniques like equivalence checking and model checking for hardware designs, there has been growing interest in applying such techniqu...
Franjo Ivancic, Ilya Shlyakhter, Aarti Gupta, Mala...
WORDS
2005
IEEE
15 years 7 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...