Sciweavers

2186 search results - page 142 / 438
» Model Transformation Technologies in the Context of Modellin...
Sort
View
FASE
2009
Springer
14 years 3 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
ACMACE
2009
ACM
14 years 12 days ago
Enhancing a motion capture interface by introducing context management
Nowadays, video games propose rich scenarios with movementsbased game play, through the manipulation of dedicated devices. The motivation of this study is the elaboration of a com...
Francois Picard, Pascal Estraillier
COMSWARE
2007
IEEE
14 years 3 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
ISSRE
2010
IEEE
13 years 7 months ago
A Case Study on Safety Cases in the Automotive Domain: Modules, Patterns, and Models
—Driven by market needs and laws, automotive manufacturers develop ever more feature-rich and complex vehicles. This new functionality plays even an active role in driving, what ...
Stefan Wagner, Bernhard Schätz, Stefan Puchne...
IAT
2010
IEEE
13 years 7 months ago
Modular JADE Agents Design and Implementation Using ASEME
ASEME is an emerging Agent Oriented Software Engineering (AOSE) methodology. The Model-Driven Engineering (MDE) paradigm encourages software modelers to automate the transition of...
Nikolaos I. Spanoudakis, Pavlos Moraitis