Sciweavers

346 search results - page 53 / 70
» Panel: Extending UML from Software to Systems Engineering
Sort
View
KBSE
2007
IEEE
14 years 1 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
FOIKS
2004
Springer
14 years 27 days ago
Abstract State Machines: An Overview of the Project
State Machines: An Overview of the Project Yuri Gurevich Microsoft Research, One Microsoft Way, Redmond, WA 98052 November 2003 This is an extended abstract of an invited talk at ...
Yuri Gurevich
COMPSAC
2002
IEEE
14 years 14 days ago
Dependency Analysis and Visualization as Tools to Prolong System Life
This paper describes our experience using dependency analysis and visualization as a tool to identify intervention points for migrating applications to environments where they can...
Dave McComb, Simon Robe, Simon Hoare, Stew Crawfor...
AVI
2004
13 years 9 months ago
Xface: MPEG-4 based open source toolkit for 3D Facial Animation
In this paper, we present our open source, platform independent toolkit for developing 3D talking agents, namely Xface. It relies on MPEG-4 Face Animation (FA) standard. The toolk...
Koray Balci
AROBOTS
2011
13 years 2 months ago
Learning GP-BayesFilters via Gaussian process latent variable models
Abstract— GP-BayesFilters are a general framework for integrating Gaussian process prediction and observation models into Bayesian filtering techniques, including particle filt...
Jonathan Ko, Dieter Fox