Sciweavers

1156 search results - page 133 / 232
» Compositional Methods for Information-Hiding
Sort
View
FASE
2010
Springer
13 years 7 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim
IADIS
2009
13 years 6 months ago
Semantically distinct verb classes involved in sentiment analysis
The paper describes a novel rule-based approach to classification of opinion statements on the level of individual sentences. In contrast to existing approaches, the proposed meth...
Alena Neviarouskaya, Helmut Prendinger, Mitsuru Is...
IFM
2009
Springer
153views Formal Methods» more  IFM 2009»
13 years 6 months ago
Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B
This paper introduces action refinement in the context of CSP B. Our motivation to include this notion of refinement within the CSP B framework is the desire to increase flexibilit...
Steve Schneider, Helen Treharne
ICEXSS
2010
13 years 3 months ago
Systemic Service Design: Aligning Value and Implementation
The promise of service orientation is that it enables an organization to prosper by delivering continuous value to customers. This prosperity is of strategic value to the organizat...
Arash Golnam, Gil Regev, Julien Ramboz, Philippe L...
JIPS
2010
176views more  JIPS 2010»
13 years 3 months ago
Recognition of Human Facial Expression in a Video Image using the Active Appearance Model
Tracking human facial expression within a video image has many useful applications, such as surveillance and teleconferencing, etc. Initially, the Active Appearance Model (AAM) was...
Gyeong-Sic Jo, Yong-Guk Kim