Sciweavers

1352 search results - page 223 / 271
» Designing Security Requirements Models Through Planning
Sort
View
EMSOFT
2005
Springer
14 years 2 months ago
Synchronization of periodic clocks
We propose a programming model dedicated to real-time videostreaming applications for embedded media devices, including highdefinition TVs. This model is built on the synchronous...
Albert Cohen, Marc Duranton, Christine Eisenbeis, ...
MASCOTS
2001
13 years 10 months ago
Parameterized Mobile Action Generator for a Wireless PCS Network
While there are different research groups in the mobile computing community, most research requires mobile action data in terms of user calling and mobility patterns. Since collec...
Sang-Eon Park, Carla N. Purdy
BMVC
2000
13 years 10 months ago
A New Easy Camera Calibration Technique Based on Circular Points
Inspired by Zhang's work, a new easy technique for calibrating a camera based on circular points is proposed. The proposed technique only requires the camera to observe a new...
Xiaoqiao Meng, Hua Li, Zhanyi Hu
IJAOSE
2008
97views more  IJAOSE 2008»
13 years 8 months ago
Formal driven prototyping approach for multiagent systems
: Even if Multiagent Systems (MASs) are recognised as an appealing paradigm for designing many computer systems ranging from complex distributed systems to intelligent software app...
Vincent Hilaire, Pablo Gruer, Abderrafiaa Koukam, ...
POPL
2012
ACM
12 years 4 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama