Sciweavers

1352 search results - page 139 / 271
» Designing Security Requirements Models Through Planning
Sort
View
118
Voted
ICDAR
2009
IEEE
15 years 10 months ago
2D CAD Data Mining Based on Spatial Relation
In this research, we propose CAD data mining technique to obtain semantic elements without prior knowledge about plans being designed. Our method consists of two steps. The first ...
Hiroaki Kizu, Junko Yamamoto, Takeshi Takeda, Keij...
110
Voted
ATAL
2009
Springer
15 years 7 months ago
Norm-based behaviour modification in BDI agents
While there has been much work on developing frameworks and models of norms and normative systems, consideration of the impact of norms on the practical reasoning of agents has at...
Felipe Rech Meneguzzi, Michael Luck
124
Voted
BPM
2005
Springer
173views Business» more  BPM 2005»
15 years 9 months ago
Semi-automatic Generation of Web Services and BPEL Processes - A Model-Driven Approach
With the advent of Web services and orchestration specifications like BPEL it is possible to define workflows on an Internet-scale. In the health-care domain highly structured and ...
Rainer Anzböck, Schahram Dustdar
113
Voted
APSEC
2005
IEEE
15 years 9 months ago
Exception Handling: An Architecture Model and Utility Support
Exception handling design is an important but difficult subject in software development. In Java software development, the use of checked exceptions exacerbates the difficulty. In...
Yu Chin Cheng, Jung-Sing Jwo
145
Voted
DATE
2005
IEEE
100views Hardware» more  DATE 2005»
15 years 5 months ago
The Role of Model-Level Transactors and UML in Functional Prototyping of Systems-on-Chip: A Software-Radio Application
Developing a functional prototype of a system-on-chip provides a unifying vehicle for model validation and system refinement. Keeping the prototype executable everal abstraction l...
Alexandre Chureau, Yvon Savaria, El Mostapha Aboul...