Sciweavers

6434 search results - page 194 / 1287
» Model Transformations with Reference Models
Sort
View
I3E
2003
100views Business» more  I3E 2003»
14 years 4 days ago
Use of Models and Modelling Techniques for Service Development
: E-applications are increasingly being composed from individual services that can be realized with different technologies, such as, e.g., Web Services and standard component techn...
Luís Ferreira Pires, Marten van Sinderen, C...
ECCV
2006
Springer
15 years 19 days ago
Molding Face Shapes by Example
Abstract. Human faces are remarkably similar in global properties, including size, aspect ratios, and locations of main features, but can vary considerably in details across indivi...
Ira Kemelmacher, Ronen Basri
SPIN
2009
Springer
14 years 5 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
EDOC
2003
IEEE
14 years 4 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 11 months ago
Automatically Discovering Hidden Transformation Chaining Constraints
Abstract. Model transformations operate on models conforming to precisely defined metamodels. Consequently, it often seems relatively easy to chain them: the output of a transforma...
Raphaël Chenouard, Frédéric Jou...