Sciweavers

217 search results - page 20 / 44
» Conflict analysis
Sort
View
RE
2002
Springer
13 years 7 months ago
AGORA: Attributed Goal-Oriented Requirements Analysis Method
This paper presents an extended version of GoalOriented Requirements Analysis Method called AGORA, where attribute values, e.g. contribution values and preference matrices, are ad...
Haruhiko Kaiya, Hisayuki Horai, Motoshi Saeki
JDCTA
2010
113views more  JDCTA 2010»
13 years 2 months ago
A Watermarking Algorithm Based on Block Energy Analysis of Wavelet Transform's Coefficients and Lorenz Chaotic Attractor
Perceptual transparency and robustness are conflicting requirements. To ensure the security of the watermarkhow to choose the embedding position and intensity is a difficult probl...
Xuelong Hu, Wei Tian, Yongai Zheng
JSW
2008
136views more  JSW 2008»
13 years 7 months ago
Collaborative Product Configuration: Formalization and Efficient Algorithms for Dependency Analysis
- In the Software Product Line approach, product configuration is a key activity in which stakeholders choose features for a product. This activity is critical in the sense that ca...
Marcílio Mendonça, Donald D. Cowan, ...
CCE
2010
13 years 5 months ago
Green process design, green energy, and sustainability: A systems analysis perspective
This paper presents a systems analysis perspective that extends the traditional process design framework to green process design, green energy and industrial ecology leading to su...
Urmila M. Diwekar, Yogendra N. Shastri
ICIP
2008
IEEE
14 years 9 months ago
Game-theoretic analysis of maximum-payoff multiuser collusion
Multiuser collusion is an effective attack against traitor-tracing multimedia fingerprinting, where a group of attackers collectively mount attacks to reduce their risk of being d...
H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu