Sciweavers

1352 search results - page 114 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CCS
2008
ACM
14 years 3 days ago
A general model of probabilistic packet marking for IP traceback
In this paper, we model Probabilistic Packet Marking (PPM) schemes for IP traceback as an identification problem of a large number of markers. Each potential marker is associated ...
Liming Lu, Mun Choon Chan, Ee-Chien Chang
ICTAI
2008
IEEE
14 years 4 months ago
GeoDialogue: A Software Agent Enabling Collaborative Dialogues between a User and a Conversational GIS
A fundamental challenge that must be met to achieve a usable conversational interface to Geographic Information System (GIS) is how to enable a more natural interaction between th...
Hongmei Wang, Guoray Cai, Alan M. MacEachren
IPPS
1998
IEEE
14 years 2 months ago
High-Performance External Computations Using User-Controllable I/O
The UPIO (User-controllable Parallel I/O) we proposed xtends the abstraction of a linear file model into an n-dimensional file model, making it possible to control the layout of d...
Jang Sun Lee, Sung Hoon Ko, Sanjay Ranka, Byung Eu...
CAD
2002
Springer
13 years 10 months ago
Free-form design using axial curve-pairs
Deformation of 3D shapes usually requires the use of a deformation tool. The freeform deformation technique requires the use of a lattice of control point for deforming an object....
K. C. Hui
OOPSLA
2007
Springer
14 years 4 months ago
SmartEMF: guidance in modeling tools
The advent of domain-specific modeling in enterprise systems development has given rise to new tool requirements. Existing tools do not offer sufficient modeling guidance or inc...
Anders Hessellund