Sciweavers

3404 search results - page 549 / 681
» EJB Design Patterns
Sort
View
RE
2005
Springer
14 years 3 months ago
Modeling Security Requirements Through Ownership, Permission and Delegation
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
14 years 3 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
SELMAS
2005
Springer
14 years 3 months ago
A Product-Line Approach to Promote Asset Reuse in Multi-agent Systems
Software reuse technologies have been a driving force in significantly reducing both the time and cost of software specification, development, maintenance and evolution. However, t...
Josh Dehlinger, Robyn R. Lutz
CSCW
2004
ACM
14 years 3 months ago
Predictors of availability in home life context-mediated communication
A number of studies have explored issues of interruption and availability in workplace environments, but few have examined how attitudes toward availability play out in home life....
Kristine S. Nagel, James M. Hudson, Gregory D. Abo...
MM
2004
ACM
244views Multimedia» more  MM 2004»
14 years 3 months ago
Automatic replay generation for soccer video broadcasting
While most current approaches for sports video analysis are based on broadcast video, in this paper, we present a novel approach for highlight detection and automatic replay gener...
Jinjun Wang, Changsheng Xu, Chng Eng Siong, Kongwa...