Sciweavers

340 search results - page 44 / 68
» Validating Business Requirements Using MAS Analysis Models
Sort
View
POLICY
2005
Springer
15 years 6 months ago
Deriving Semantic Models from Privacy Policies
Natural language policies describe interactions between and across organizations, third-parties and individuals. However, current policy languages are limited in their ability to ...
Travis D. Breaux, Annie I. Antón
134
Voted
TDSC
2011
14 years 7 months ago
An Obfuscation-Based Approach for Protecting Location Privacy
—The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the phys...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
VTC
2007
IEEE
200views Communications» more  VTC 2007»
15 years 6 months ago
General Analysis of Uplink Group-Orthogonal MC-CDMA systems
Abstract—Group-orthogonal multicarrier code-division multiple access (GO-MC-CDMA) has been proposed as a multiplexing technique for the uplink segment of wireless systems. The di...
Guillem Femenias, Felip Riera-Palou, Jaume Ramis
94
Voted
RIDE
2002
IEEE
15 years 5 months ago
Enhancive Index for Structured Document
Structured documents, especially the XML documents, are made up of a few logical components, such as title, sections, subsections and paragraphs. The components in each structured...
Xiaoling Wang, Ji-Rong Wen, Yisheng Dong, Wenyin L...
124
Voted
CIBSE
2009
ACM
15 years 7 months ago
A Domain Specific Language to Generate Web Applications
Nowadays building a web application is still a complex process that requires a big effort to get several tasks done. This article presents a domain specific language aimed to simpl...
Juan José Cadavid, Juan Bernardo Quintero, ...