Sciweavers

5101 search results - page 188 / 1021
» Capturing Context Requirements
Sort
View
DEON
2008
Springer
13 years 10 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
ICAS
2008
IEEE
274views Robotics» more  ICAS 2008»
14 years 2 months ago
Model-Driven Engineering of Multi-target Plastic User Interfaces
A Multi-target user interface is composed of a series of interconnected variations of the same user interfaces, but tailored for different targets or different contexts of use. Wh...
Benoît Collignon, Jean Vanderdonckt, Gaë...
ICIP
2003
IEEE
14 years 1 months ago
Texture analysis: an adaptive probabilistic approach
Two main issues arise when working in the area of texture segmentation: the need to describe the texture accurately by capturing its underlying structure, and the need to perform ...
Karen Brady, Ian Jermyn, Josiane Zerubia
ECBS
2002
IEEE
146views Hardware» more  ECBS 2002»
14 years 1 months ago
Top-Down Composition of Software Architectures
This paper discusses an approach for top-down composition of software architectures. First, an architecture is derived that addresses functional requirements only. This architectu...
Hans de Bruin, Hans van Vliet
AOSE
2000
Springer
14 years 16 days ago
Representing Agent Interaction Protocols in UML
Gaining wide acceptance for the use of agents in industry requires both relating it to the nearest antecedent technology (objectoriented software development) and using artifacts t...
James Odell, H. Van Dyke Parunak, Bernhard Bauer