Sciweavers

1745 search results - page 114 / 349
» A Context-Based Model of Attention
Sort
View
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 10 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
RE
2010
Springer
13 years 5 months ago
Integrating Preferences into Goal Models for Requirements Engineering
Requirements can differ in their importance. As such the priorities that stakeholders associate with requirements may vary from stakeholder to stakeholder and from one situation to...
Sotirios Liaskos, Sheila A. McIlraith, Shirin Sohr...
ICSE
2004
IEEE-ACM
14 years 10 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
NTMS
2008
IEEE
14 years 4 months ago
Offline Approach to Modeling and Optimization of Flows in Peer-to-Peer Systems
—Peer-to-Peer (P2P) systems gain much attention in recent years. According to many statistics, P2P systems contribute a significant portion of the Internet traffic. Individual In...
Krzysztof Walkowiak
MIRAGE
2007
Springer
14 years 4 months ago
Model-Based Feature Extraction for Gait Analysis and Recognition
Human motion analysis has received a great attention from researchers in the last decade due to its potential use in different applications. We propose a new approach to extract h...
Imed Bouchrika, Mark S. Nixon