Sciweavers

2043 search results - page 395 / 409
» Reasoning About Security Models
Sort
View
ER
2006
Springer
169views Database» more  ER 2006»
13 years 11 months ago
A More Expressive Softgoal Conceptualization for Quality Requirements Analysis
Initial software quality requirements tend to be imprecise, subjective, idealistic, and context-specific. An extended characterization of the common Softgoal concept is proposed fo...
Ivan Jureta, Stéphane Faulkner, Pierre-Yves...
DAGSTUHL
2007
13 years 11 months ago
Programming self developing blob machines for spatial computing.
: This is a position paper introducing blob computing: A Blob is a generic primitive used to structure a uniform computing substrate into an easier-to-program parallel virtual mach...
Frédéric Gruau, Christine Eisenbeis
AAAI
2006
13 years 11 months ago
ScriptEase - Motivational Behaviors for Interactive Characters in Computer Role-Playing Games
ScriptEase is a tool that allows authors with no programming experience to create interactive stories for computer role-playing games. Instead of writing scripting code manually, ...
Maria Cutumisu, Duane Szafron, Jonathan Schaeffer,...
ESANN
2004
13 years 11 months ago
Neural networks for data mining: constrains and open problems
When we talk about using neural networks for data mining we have in mind the original data mining scope and challenge. How did neural networks meet this challenge? Can we run neura...
Razvan Andonie, Boris Kovalerchuk
IADIS
2004
13 years 11 months ago
A Study on Mobile Game Adoption Under HPI(High-Speed Portable Internet) Environment
Mobile game is considered as one of the emerging mobile services in recent years. A number of mobile game companies have been established and on-line game providers have also atte...
Young Seog Yoon, Im Sook Há, Mun Kee Choi