Sciweavers

1352 search results - page 211 / 271
» Designing Security Requirements Models Through Planning
Sort
View
TOG
2010
89views more  TOG 2010»
13 years 3 months ago
Volumetric modeling with diffusion surfaces
The modeling of volumetric objects is still a difficult problem. Solid texture synthesis methods enable the design of volumes with homogeneous textures, but global features such a...
Kenshi Takayama, Olga Sorkine, Andrew Nealen, Take...
AAAI
2006
13 years 10 months ago
Using an Ontology for Knowledge Acquisition
We describe an approach to distributed knowledge acquisition using an ontology. The ontology is used to represent and reason about soldier performance. These methods are embedded ...
Stacy Lovell, Webb Stacy
USS
2010
13 years 6 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
SNPD
2003
13 years 10 months ago
Integration of Simulation Based Performance Assessment in a Software Development Process
From the early design phase through the implementation performance assessment of software has been subject to a great variety of approaches in the past. Performance modeling artif...
Michael N. Barth
GIS
2003
ACM
14 years 10 months ago
A predictive location model for location-based services
Location-Based Services (LBSs) utilize information about users' locations through location-aware mobile devices to provide services, such as nearest features of interest, the...
Hassan A. Karimi, Xiong Liu