Sciweavers

3284 search results - page 577 / 657
» On the modularity of feature interactions
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 6 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
IJISMD
2010
164views more  IJISMD 2010»
13 years 6 months ago
Management of Correctness Problems in UML Class Diagrams Towards a Pattern-Based Approach
UML is now widely accepted as the standard modeling language for software construction. The Class Diagram is its core view, having well formed semantics and providing the backbone...
Mira Balaban, Azzam Maraee, Arnon Sturm
ECCV
2010
Springer
13 years 9 months ago
Seeing People in Social Context: Recognizing People and Social Relationships
The people in an image are generally not strangers, but instead often share social relationships such as husband-wife, siblings, grandparent-child, father-child, or mother-child. F...
Gang Wang, Andrew C. Gallagher, Jiebo Luo, David A...
CCS
2010
ACM
13 years 3 months ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
CDC
2010
IEEE
130views Control Systems» more  CDC 2010»
13 years 3 months ago
Generalized efficiency bounds in distributed resource allocation
Game theory is emerging as a popular tool for distributed control of multiagent systems. In order to take advantage of these game theoretic tools the interactions of the autonomous...
Jason R. Marden, Tim Roughgarden