Sciweavers

1431 search results - page 197 / 287
» Solving Constraints in Model Transformations
Sort
View
125
Voted
KBSE
2007
IEEE
15 years 7 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
127
Voted
CF
2004
ACM
15 years 6 months ago
Modeling service-based multimedia content adaptation in pervasive computing
Pervasive computing applications allow users to access information from anywhere while traveling and using variety of devices. Heterogeneity and limitation of resources involved i...
Girma Berhe, Lionel Brunie, Jean-Marc Pierson
POPL
2009
ACM
15 years 7 months ago
Declarative aspects of memory management in the concurrent collections parallel programming model
Concurrent Collections (CnC)[8] is a declarative parallel language that allows the application developer to express their parallel application as a collection of high-level comput...
Zoran Budimlic, Aparna Chandramowlishwaran, Kathle...
WSC
2000
15 years 1 months ago
Input modeling using a computer algebra system
Input modeling that involves fitting standard univariate parametric probability distributions is typically performed using an input modeling package. These packages typically fit ...
Diane L. Evans, Lawrence Leemis
100
Voted
MICCAI
2008
Springer
16 years 1 months ago
A Novel Explicit 2D+t Cyclic Shape Model Applied to Echocardiography
In this paper, we propose a novel explicit 2D+t cyclic shape model that extends the Point Distribution Model (PDM) to shapes like myocardial contours with cyclic dynamics. We also ...
Ramón Casero, J. Alison Noble