Sciweavers

1655 search results - page 174 / 331
» Stemming in the language modeling framework
Sort
View
97
Voted
UM
2005
Springer
15 years 6 months ago
Modeling Agents That Exhibit Variable Performance in a Collaborative Setting
In a collaborative environment, knowledge about collaborators’ skills is an important factor when determining which team members should perform a task. However, this knowledge ma...
Ingrid Zukerman, Christian Guttmann
IJNSEC
2010
145views more  IJNSEC 2010»
14 years 7 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
90
Voted
FASE
2010
Springer
15 years 7 months ago
Reusing Model Transformations While Preserving Properties
Abstract. Model transformations are indispensable to model-based development (MBD) where they act as translators between domain-specific languages (DSLs). As a result, transformat...
Ethan K. Jackson, Wolfram Schulte, Daniel Balasubr...
106
Voted
EDOC
2007
IEEE
15 years 7 months ago
Model-Driven Engineering for Requirements Analysis
Requirements engineering (RE) encompasses a set of activities for eliciting, modelling, agreeing, communicating and validating requirements that precisely define the problem doma...
Benoit Baudry, Clémentine Nebut, Yves Le Tr...
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 6 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel