Sciweavers

578 search results - page 82 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
CCS
2008
ACM
13 years 11 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
CGA
2010
13 years 6 months ago
Context-Preserving, Dynamic Word Cloud Visualization
In this paper, we introduce a visualization method that couples a trend chart with word clouds to illustrate temporal content evolutions in a set of documents. Specifically, we us...
Weiwei Cui, Yingcai Wu, Shixia Liu, Furu Wei, Mich...
SLE
2009
Springer
14 years 3 months ago
Ontological Metamodeling with Explicit Instantiation
Model Driven Engineering (MDE) is a promising paradigm for development. It raises the level of abstraction in software development by treating models as primary artifacts. The prac...
Alfons Laarman, Ivan Kurtev
SAMT
2007
Springer
117views Multimedia» more  SAMT 2007»
14 years 3 months ago
A Region Thesaurus Approach for High-Level Concept Detection in the Natural Disaster Domain
Abstract. This paper presents an approach on high-level feature detection using a region thesaurus. MPEG-7 features are locally extracted from segmented regions and for a large set...
Evaggelos Spyrou, Yannis S. Avrithis
SAFECOMP
2007
Springer
14 years 3 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...