Sciweavers

1352 search results - page 205 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CGF
1999
130views more  CGF 1999»
13 years 8 months ago
A Free Form Feature Taxonomy
In this paper the notion of free form feature for aesthetic design is presented. The design of industrial products constituted by free form surfaces is done by using CAD systems r...
M. Fontana, Franca Giannini, M. Meirana
ACMDIS
2008
ACM
13 years 11 months ago
Exploring true multi-user multimodal interaction over a digital table
True multi-user, multimodal interaction over a digital table lets co-located people simultaneously gesture and speak commands to control an application. We explore this design spa...
Edward Tse, Saul Greenberg, Chia Shen, Clifton For...
EIS
2011
290views ECommerce» more  EIS 2011»
13 years 3 months ago
Code query by example
Most software engineering techniques that deal with software products customization are based on anticipation: The software designer has to foresee, somehow, the future needs for ...
Sebastien Vaucouleur
WSC
2001
13 years 10 months ago
Satellite communications representation in network simulation
This paper presents methodologies to represent satellite communications (SATCOM) behaviors in network simulation. This paper is based on tasks performed for generic network warfar...
Kenneth Y. Jo
ICFP
2008
ACM
14 years 8 months ago
Functional translation of a calculus of capabilities
Reasoning about imperative programs requires the ability to track aliasing and ownership properties. We present a type system that provides this ability, by using regions, capabil...
Arthur Charguéraud, François Pottier