Sciweavers

144 search results - page 17 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
GG
2008
Springer
13 years 8 months ago
Pattern-Based Model-to-Model Transformation
We present a new, high-level approach for the specification of model-to-model transformations based on declarative patterns. These are (atomic or composite) constraints on triple ...
Juan de Lara, Esther Guerra
AVI
2006
13 years 9 months ago
Mixed reality: a model of mixed interaction
Mixed reality systems seek to smoothly link the physical and data processing (digital) environments. Although mixed reality systems are becoming more prevalent, we still do not ha...
Céline Coutrix, Laurence Nigay
ER
2004
Springer
90views Database» more  ER 2004»
14 years 28 days ago
Semantic Interpretation and Matching of Web Services
A major issue in the study of semantic Web services concerns the matching problem of Web services. Various techniques for this problem have been proposed. Typical ones include FSM ...
Chang Xu, Shing-Chi Cheung, Xiangye Xiao
SIMULATION
2002
118views more  SIMULATION 2002»
13 years 7 months ago
Simulation of Tactical Communications Systems by Inferring Detailed Data from the Joint Theater-Level Computer-Aided Exercises
- In this paper, a new scheme for the simulation of tactical communications systems is introduced where the mobility, call and availability patterns for the communications equipmen...
Erdal Cayirci, Cem Ersoy
CIKM
2008
Springer
13 years 9 months ago
Scalable community discovery on textual data with relations
Every piece of textual data is generated as a method to convey its authors' opinion regarding specific topics. Authors deliberately organize their writings and create links, ...
Huajing Li, Zaiqing Nie, Wang-Chien Lee, C. Lee Gi...