Sciweavers

1352 search results - page 185 / 271
» Designing Security Requirements Models Through Planning
Sort
View
AOSD
2009
ACM
14 years 3 months ago
Modelling hardware verification concerns specified in the e language: an experience report
e is an aspect-oriented hardware verification language that is widely used to verify the design of electronic circuits through the development and execution of testbenches. In rec...
Darren Galpin, Cormac Driver, Siobhán Clark...
WSCG
2004
199views more  WSCG 2004»
13 years 10 months ago
Expressive Volume Rendering
Accurately and automatically conveying the structure of a volume model is a problem not fully solved by existing volume rendering approaches. Physics-based volume rendering approa...
Penny Rheingans
COR
2008
67views more  COR 2008»
13 years 9 months ago
Selecting compact habitat reserves for species with differential habitat size needs
We propose a model for the design of protected habitat reserves, which maximizes the number of species represented at least once in a limited set of reserved sites or parcels. Mos...
Vladimir Marianov, Charles S. Revelle, Stephanie S...
EWSA
2005
Springer
14 years 2 months ago
Context-Awareness in Software Architectures
The growing importance of context-awareness in the construction of adaptable systems requires the development of formal models and notations that can bring this new dimension from ...
Antónia Lopes, José Luiz Fiadeiro
JTAER
2007
125views more  JTAER 2007»
13 years 8 months ago
Australian Case Studies in Mobile Commerce
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical m...
Jonathan O'Donnell, Margaret Jackson, Marita Shell...