Sciweavers

1054 search results - page 144 / 211
» Model Transformations in the Model-Based Development of Real...
Sort
View
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
13 years 10 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
EDOC
2003
IEEE
14 years 2 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...
ASWEC
2010
IEEE
13 years 9 months ago
Non-Monotonic Model Completion in Web Application Engineering
—Formal models are often used to verify systems and prove their correctness, and ensure that transformed models remain consistent to the original system. However, formal techniqu...
Jevon M. Wright, Jens Dietrich
COLING
2010
13 years 3 months ago
Translation Model Generalization using Probability Averaging for Machine Translation
Previous methods on improving translation quality by employing multiple SMT models usually carry out as a secondpass decision procedure on hypotheses from multiple systems using e...
Nan Duan, Hong Sun, Ming Zhou
ACAL
2009
Springer
14 years 3 months ago
A Developmental System for Organic Form Synthesis
Modelling the geometry of organic forms using traditional CAD or animation tools is often difficult and tedious. Different models of morphogenesis have been successfully applied t...
Benjamin Porter