Sciweavers

346 search results - page 53 / 70
» Panel: Extending UML from Software to Systems Engineering
Sort
View
117
Voted
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
141
Voted
FOIKS
2004
Springer
15 years 9 months ago
Abstract State Machines: An Overview of the Project
State Machines: An Overview of the Project Yuri Gurevich Microsoft Research, One Microsoft Way, Redmond, WA 98052 November 2003 This is an extended abstract of an invited talk at ...
Yuri Gurevich
110
Voted
COMPSAC
2002
IEEE
15 years 8 months ago
Dependency Analysis and Visualization as Tools to Prolong System Life
This paper describes our experience using dependency analysis and visualization as a tool to identify intervention points for migrating applications to environments where they can...
Dave McComb, Simon Robe, Simon Hoare, Stew Crawfor...
127
Voted
AVI
2004
15 years 5 months ago
Xface: MPEG-4 based open source toolkit for 3D Facial Animation
In this paper, we present our open source, platform independent toolkit for developing 3D talking agents, namely Xface. It relies on MPEG-4 Face Animation (FA) standard. The toolk...
Koray Balci
187
Voted
AROBOTS
2011
14 years 10 months ago
Learning GP-BayesFilters via Gaussian process latent variable models
Abstract— GP-BayesFilters are a general framework for integrating Gaussian process prediction and observation models into Bayesian filtering techniques, including particle filt...
Jonathan Ko, Dieter Fox