Sciweavers

674 search results - page 94 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
TAOSD
2010
15 years 6 days ago
A Graph-Based Aspect Interference Detection Approach for UML-Based Aspect-Oriented Models
Abstract. Aspect Oriented Modeling (AOM) techniques facilitate separate modeling of concerns and allow for a more flexible composition of these than traditional modeling technique...
Selim Ciraci, Wilke Havinga, Mehmet Aksit, Christo...
150
Voted
ISOLA
2010
Springer
15 years 9 days ago
LivingKnowledge: Kernel Methods for Relational Learning and Semantic Modeling
Latest results of statistical learning theory have provided techniques such us pattern analysis and relational learning, which help in modeling system behavior, e.g. the semantics ...
Alessandro Moschitti
TACAS
1998
Springer
81views Algorithms» more  TACAS 1998»
15 years 6 months ago
Formal Design and Analysis of a Gear Controller
In this paper, we report on an application of the validation and veri cation tool kit Uppaal in the design and analysis of a prototype gear controller, carried out in a joint proje...
Magnus Lindahl, Paul Pettersson, Wang Yi
ICIP
2009
IEEE
16 years 2 months ago
Circular Blurred Shape Model For Symbol Spotting In Documents
Symbol spotting problem requires feature extraction strategies able to generalize from training samples and to localize the target object while discarding most part of the image. ...
150
Voted
WSE
2002
IEEE
15 years 6 months ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...